First published: Fri Dec 17 2021(Updated: )
A misconfiguration in HTTP/1.0 and HTTP/1.1 of the web interface in TP-Link AX10v1 before V1_211117 allows a remote unauthenticated attacker to send a specially crafted HTTP request and receive a misconfigured HTTP/0.9 response, potentially leading into a cache poisoning attack.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Archer Ax10 Firmware | <v1_211117 | |
TP-Link Archer AX10 | =v1 | |
All of | ||
Tp-link Archer Ax10 Firmware | <v1_211117 | |
TP-Link Archer AX10 | =v1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41451 is a misconfiguration vulnerability in the web interface of TP-Link AX10v1 before V1_211117, which allows a remote unauthenticated attacker to perform a cache poisoning attack.
CVE-2021-41451 works by exploiting a misconfiguration in the HTTP/1.0 and HTTP/1.1 protocols, allowing an attacker to send a specially crafted HTTP request and receive a misconfigured HTTP/0.9 response.
CVE-2021-41451 has a severity rating of 7.5 (High).
TP-Link Archer AX10 firmware versions before V1_211117 are affected by CVE-2021-41451.
To fix CVE-2021-41451, users should update their TP-Link Archer AX10 firmware to V1_211117 or later.