Vulnerabilites related to tp-link - tl-wr710n
cve-2022-4498
Vulnerability from cvelistv5
Published
2023-01-11 20:38
Modified
2024-08-03 01:41
Severity ?
Summary
In TP-Link routers, Archer C5 and WR710N-V1, running the latest available code, when receiving HTTP Basic Authentication the httpd service can be sent a crafted packet that causes a heap overflow. This can result in either a DoS (by crashing the httpd process) or an arbitrary code execution.
References
Impacted products
Vendor Product Version
TP-Link WR710N Version: V1-151022
Create a notification for this product.
   TP-Link Archer C5 Version: V2_160221_US
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T01:41:44.949Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://kb.cert.org/vuls/id/572615",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "WR710N",
               vendor: "TP-Link",
               versions: [
                  {
                     status: "affected",
                     version: "V1-151022",
                  },
               ],
            },
            {
               product: "Archer C5",
               vendor: "TP-Link",
               versions: [
                  {
                     status: "affected",
                     version: "V2_160221_US",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In TP-Link routers, Archer C5 and WR710N-V1, running the latest available code, when receiving HTTP Basic Authentication the httpd service can be sent a crafted packet that causes a heap overflow. This can result in either a DoS (by crashing the httpd process) or an arbitrary code execution.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-01-11T20:38:37.312Z",
            orgId: "37e5125f-f79b-445b-8fad-9564f167944b",
            shortName: "certcc",
         },
         references: [
            {
               url: "https://kb.cert.org/vuls/id/572615",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "A vulnerable HTTP Basic Authentication process in TP-Link routers, Archer C5 and WR710N-V1, is susceptible to either a DoS or an arbitrary code execution via any interface.",
         x_generator: {
            engine: "VINCE 2.0.5",
            env: "prod",
            origin: "https://cveawg.mitre.org/api//cve/CVE-2022-4498",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "37e5125f-f79b-445b-8fad-9564f167944b",
      assignerShortName: "certcc",
      cveId: "CVE-2022-4498",
      datePublished: "2023-01-11T20:38:37.312Z",
      dateReserved: "2022-12-14T17:59:41.586Z",
      dateUpdated: "2024-08-03T01:41:44.949Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-4499
Vulnerability from cvelistv5
Published
2023-01-11 18:48
Modified
2024-08-03 01:41
Severity ?
Summary
TP-Link routers, Archer C5 and WR710N-V1, using the latest software, the strcmp function used for checking credentials in httpd, is susceptible to a side-channel attack. By measuring the response time of the httpd process, an attacker could guess each byte of the username and password.
References
Impacted products
Vendor Product Version
TP-Link WR710N Version: V1-151022
Create a notification for this product.
   TP-Link Archer C5 Version: V2_160221_US
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T01:41:45.010Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://kb.cert.org/vuls/id/572615",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "WR710N",
               vendor: "TP-Link",
               versions: [
                  {
                     status: "affected",
                     version: "V1-151022",
                  },
               ],
            },
            {
               product: "Archer C5",
               vendor: "TP-Link",
               versions: [
                  {
                     status: "affected",
                     version: "V2_160221_US",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "TP-Link routers, Archer C5 and WR710N-V1, using the latest software, the strcmp function used for checking credentials in httpd, is susceptible to a side-channel attack. By measuring the response time of the httpd process, an attacker could guess each byte of the username and password.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "CWE-676",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-01-12T17:03:51.519Z",
            orgId: "37e5125f-f79b-445b-8fad-9564f167944b",
            shortName: "certcc",
         },
         references: [
            {
               url: "https://kb.cert.org/vuls/id/572615",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "The strcmp function in TP-Link routers, Archer C5 and WR710N-V1, used for checking credentials in httpd, is susceptible to a side-channel attack.",
         x_generator: {
            engine: "VINCE 2.0.5",
            env: "prod",
            origin: "https://cveawg.mitre.org/api/cve/CVE-2022-4499",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "37e5125f-f79b-445b-8fad-9564f167944b",
      assignerShortName: "certcc",
      cveId: "CVE-2022-4499",
      datePublished: "2023-01-11T18:48:41.778Z",
      dateReserved: "2022-12-14T18:09:49.250Z",
      dateUpdated: "2024-08-03T01:41:45.010Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2023-01-11 19:15
Modified
2024-11-21 07:35
Summary
TP-Link routers, Archer C5 and WR710N-V1, using the latest software, the strcmp function used for checking credentials in httpd, is susceptible to a side-channel attack. By measuring the response time of the httpd process, an attacker could guess each byte of the username and password.
References
Impacted products
Vendor Product Version
tp-link archer_c5_firmware 2_160201_us
tp-link archer_c5 2.0
tp-link tl-wr710n_firmware 1_151022_us
tp-link tl-wr710n 1.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:tp-link:archer_c5_firmware:2_160201_us:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7CD0ED5-31F0-47CD-AC06-FA1909722F91",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:tp-link:archer_c5:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FE42DA9-9225-4D3F-920E-DD826369FB49",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:tp-link:tl-wr710n_firmware:1_151022_us:*:*:*:*:*:*:*",
                     matchCriteriaId: "343FFD09-AE5D-48F3-A6A9-F28A66D3D49D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:tp-link:tl-wr710n:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E936B0D-9F70-4F35-A135-6255FA6405DF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "TP-Link routers, Archer C5 and WR710N-V1, using the latest software, the strcmp function used for checking credentials in httpd, is susceptible to a side-channel attack. By measuring the response time of the httpd process, an attacker could guess each byte of the username and password.",
      },
      {
         lang: "es",
         value: "Los routers TP-Link, Archer C5 y WR710N-V1, que utilizan el software más reciente, la función strcmp utilizada para verificar las credenciales en httpd, son susceptibles a un ataque de canal lateral. Al medir el tiempo de respuesta del proceso httpd, un atacante podría adivinar cada byte del nombre de usuario y la contraseña.",
      },
   ],
   id: "CVE-2022-4499",
   lastModified: "2024-11-21T07:35:23.177",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-01-11T19:15:10.170",
   references: [
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://kb.cert.org/vuls/id/572615",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://kb.cert.org/vuls/id/572615",
      },
   ],
   sourceIdentifier: "cret@cert.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-203",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-01-11 21:15
Modified
2024-11-21 07:35
Severity ?
Summary
In TP-Link routers, Archer C5 and WR710N-V1, running the latest available code, when receiving HTTP Basic Authentication the httpd service can be sent a crafted packet that causes a heap overflow. This can result in either a DoS (by crashing the httpd process) or an arbitrary code execution.
References
cret@cert.orghttps://kb.cert.org/vuls/id/572615Third Party Advisory, US Government Resource, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://kb.cert.org/vuls/id/572615Third Party Advisory, US Government Resource, VDB Entry
Impacted products
Vendor Product Version
tp-link archer_c5_firmware 2_160201_us
tp-link archer_c5 2.0
tp-link tl-wr710n_firmware 1_151022_us
tp-link tl-wr710n 1.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:tp-link:archer_c5_firmware:2_160201_us:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7CD0ED5-31F0-47CD-AC06-FA1909722F91",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:tp-link:archer_c5:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FE42DA9-9225-4D3F-920E-DD826369FB49",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:tp-link:tl-wr710n_firmware:1_151022_us:*:*:*:*:*:*:*",
                     matchCriteriaId: "343FFD09-AE5D-48F3-A6A9-F28A66D3D49D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:tp-link:tl-wr710n:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E936B0D-9F70-4F35-A135-6255FA6405DF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In TP-Link routers, Archer C5 and WR710N-V1, running the latest available code, when receiving HTTP Basic Authentication the httpd service can be sent a crafted packet that causes a heap overflow. This can result in either a DoS (by crashing the httpd process) or an arbitrary code execution.",
      },
      {
         lang: "es",
         value: "En los routers TP-Link, Archer C5 y WR710N-V1, que ejecutan el último código disponible, al recibir autenticación básica HTTP, se puede enviar al servicio httpd un paquete manipulado que provoca un desbordamiento del almacenamiento dinámico. Esto puede resultar en un DoS (al bloquear el proceso httpd) o en la ejecución de código arbitrario.",
      },
   ],
   id: "CVE-2022-4498",
   lastModified: "2024-11-21T07:35:23.057",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-01-11T21:15:10.213",
   references: [
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
            "VDB Entry",
         ],
         url: "https://kb.cert.org/vuls/id/572615",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
            "VDB Entry",
         ],
         url: "https://kb.cert.org/vuls/id/572615",
      },
   ],
   sourceIdentifier: "cret@cert.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}