First published: Wed Dec 08 2021(Updated: )
An HTTP request smuggling attack in TP-Link AX10v1 before v1_211117 allows a remote unauthenticated attacker to DoS the web application via sending a specific HTTP packet.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Archer Ax10 V1 Firmware | <211117 | |
Tp-link Archer Ax10 V1 | ||
All of | ||
Tp-link Archer Ax10 V1 Firmware | <211117 | |
Tp-link Archer Ax10 V1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41450 is a vulnerability that allows a remote unauthenticated attacker to perform an HTTP request smuggling attack in TP-Link AX10v1 before v1_211117, leading to a denial-of-service (DoS) of the web application.
CVE-2021-41450 impacts TP-Link AX10v1 by enabling a remote unauthenticated attacker to trigger a DoS attack on the web application by sending a specific HTTP packet.
CVE-2021-41450 has a severity value of 7.5, indicating a high severity.
To fix CVE-2021-41450, users should update their TP-Link AX10v1 firmware to version v1_211117 or newer.
More information about CVE-2021-41450 can be found on the official TP-Link website and in the CVE database.