First published: Tue Dec 07 2021(Updated: )
A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in TP-Link AX10v1 before V1_211014, allows a remote unauthenticated attacker to disconnect an already connected wireless client via sending with a wireless adapter specific spoofed authentication frames
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Archer Ax10 Firmware | <v1_211014 | |
TP-Link Archer AX10 | =v1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40288 is a denial-of-service vulnerability in the WPA2 and WPA3-SAE authentication methods in TP-Link AX10v1 before V1_211014.
CVE-2021-40288 allows a remote unauthenticated attacker to disconnect an already connected wireless client by sending spoofed authentication frames with a specific wireless adapter.
CVE-2021-40288 has a severity rating of 7.5 (high).
TP-Link AX10v1 before V1_211014 is affected by CVE-2021-40288.
To fix CVE-2021-40288, update your TP-Link AX10v1 firmware to V1_211014 or later.