First published: Tue Oct 18 2022(Updated: )
The web app client of TP-Link AX10v1 V1_211117 uses hard-coded cryptographic keys when communicating with the router. Attackers who are able to intercept the communications between the web client and router through a man-in-the-middle attack can then obtain the sequence key via a brute-force attack, and access sensitive information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Ax10 Firmware | =v1_211117 | |
TP-Link AX10 | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41540 is a vulnerability in the web app client of TP-Link AX10v1 V1_211117, where hard-coded cryptographic keys are used when communicating with the router.
Attackers can exploit CVE-2022-41540 by intercepting the communications between the web client and router through a man-in-the-middle attack and then obtaining the sequence key via a brute-force attack.
The severity of CVE-2022-41540 is medium, with a CVSS severity score of 5.9.
To fix CVE-2022-41540, it is recommended to update the firmware of TP-Link AX10v1 V1_211117 to the latest version provided by TP-Link.
You can find more information about CVE-2022-41540 on the following references: [GitHub - Offline Decryption](https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/Offline-decryption) and [TP-Link Support - Archer AX10](https://www.tp-link.com/us/support/download/archer-ax10/v1/#Firmware).