Vulnerability Description
In the management interface on TP-Link Archer C5v 1.7_181221 devices, credentials are sent in a base64 format over cleartext HTTP.
CVSS Score
7.1
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Archer C5V Firmware | 1.7_181221 |
| Tp-Link | Archer C5V | 1.0 |
Related Weaknesses (CWE)
References
- https://gokay.org/tp-link-archer-c5v-base64-cookie/ExploitThird Party Advisory
- https://gokay.org/tp-link-archer-c5v-base64-cookie/ExploitThird Party Advisory
FAQ
What is CVE-2021-27209?
CVE-2021-27209 is a vulnerability with a CVSS score of 7.1 (HIGH). In the management interface on TP-Link Archer C5v 1.7_181221 devices, credentials are sent in a base64 format over cleartext HTTP.
How severe is CVE-2021-27209?
CVE-2021-27209 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-27209?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Archer C5V Firmware, Tp-Link Archer C5V.