The web app client of TP-Link AX10v1 V1_211117 uses hard-coded cryptographic keys when communicating with the router. Attackers who are able to intercept the communications between the web client and router through a man-in-the-middle attack can then obtain the sequence key via a brute-force attack, and access sensitive information.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T12:42:46.237Z
Reserved: 2022-09-26T00:00:00
Link: CVE-2022-41540

No data.

Status : Modified
Published: 2022-10-18T15:15:10.197
Modified: 2024-11-21T07:23:21.810
Link: CVE-2022-41540

No data.