Vulnerability Description
A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in TP-Link AX10v1 before V1_211014, allows a remote unauthenticated attacker to disconnect an already connected wireless client via sending with a wireless adapter specific spoofed authentication frames
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Archer Ax10 Firmware | < v1_211014 |
| Tp-Link | Archer Ax10 | v1 |
Related Weaknesses (CWE)
References
- https://www.tp-link.com/us/support/download/archer-ax10/v1/#FirmwareMitigationPatchVendor Advisory
- https://www.tp-link.com/us/support/download/archer-ax10/v1/#FirmwareMitigationPatchVendor Advisory
FAQ
What is CVE-2021-40288?
CVE-2021-40288 is a vulnerability with a CVSS score of 7.5 (HIGH). A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in TP-Link AX10v1 before V1_211014, allows a remote unauthenticated attacker to disconnect an already connected wireless client ...
How severe is CVE-2021-40288?
CVE-2021-40288 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-40288?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Archer Ax10 Firmware, Tp-Link Archer Ax10.