Vulnerability Description
TP-Link AX10v1 V1_211117 allows attackers to execute a replay attack by using a previously transmitted encrypted authentication message and valid authentication token. Attackers are able to login to the web application as an admin user.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Ax10 Firmware | v1_211117 |
| Tp-Link | Ax10 | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/ReplayExploitThird Party Advisory
- https://www.tp-link.com/us/support/download/archer-ax10/v1/#FirmwareProductVendor Advisory
- https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/ReplayExploitThird Party Advisory
- https://www.tp-link.com/us/support/download/archer-ax10/v1/#FirmwareProductVendor Advisory
FAQ
What is CVE-2022-41541?
CVE-2022-41541 is a vulnerability with a CVSS score of 8.1 (HIGH). TP-Link AX10v1 V1_211117 allows attackers to execute a replay attack by using a previously transmitted encrypted authentication message and valid authentication token. Attackers are able to login to t...
How severe is CVE-2022-41541?
CVE-2022-41541 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-41541?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Ax10 Firmware, Tp-Link Ax10.