Vulnerability Name: | CVE-2021-27209 (CCN-196812) | ||||||||||||
Assigned: | 2021-02-03 | ||||||||||||
Published: | 2021-02-03 | ||||||||||||
Updated: | 2021-02-19 | ||||||||||||
Summary: | In the management interface on TP-Link Archer C5v 1.7_181221 devices, credentials are sent in a base64 format over cleartext HTTP. | ||||||||||||
CVSS v3 Severity: | 7.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N) 6.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:U/RC:R)
4.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:U/RC:R)
| ||||||||||||
CVSS v2 Severity: | 3.6 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-319 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-27209 Source: XF Type: UNKNOWN archerc5v-cve202127209-info-disc(196812) Source: CCN Type: GoKay Web site TP-Link Archer C5v Base64 Cookie Source: MISC Type: Exploit, Third Party Advisory https://gokay.org/tp-link-archer-c5v-base64-cookie/ Source: CCN Type: TP-Link Web site AC1200 Wireless Dual Band Gigabit VoIP Router | ||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||
BACK |