First published: Wed Jan 11 2023(Updated: )
TP-Link routers, Archer C5 and WR710N-V1, using the latest software, the strcmp function used for checking credentials in httpd, is susceptible to a side-channel attack. By measuring the response time of the httpd process, an attacker could guess each byte of the username and password.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Archer C5 Firmware | =2_160201_us | |
TP-Link Archer C5 | =2.0 | |
Tp-link Tl-wr710n Firmware | =1_151022_us | |
Tp-link Tl-wr710n | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this TP-Link router vulnerability is CVE-2022-4499.
The TP-Link router models Archer C5 and WR710N-V1 using the latest software are affected by this vulnerability.
CVE-2022-4499 has a severity level of 7.5 (High).
The vulnerability CVE-2022-4499 in TP-Link routers Archer C5 and WR710N-V1 allows an attacker to guess the username and password by measuring the response time of the httpd process.
If you are using the latest software, your TP-Link Archer C5 router may be vulnerable to CVE-2022-4499.
If you are using the latest software, your TP-Link WR710N-V1 router may be vulnerable to CVE-2022-4499.
An attacker can exploit CVE-2022-4499 by measuring the response time of the httpd process to guess each byte of the username and password.
You can find more information about CVE-2022-4499 at the following reference: https://kb.cert.org/vuls/id/572615
The Common Weakness Enumeration (CWE) for CVE-2022-4499 is CWE-203 and CWE-676.