CVE-2022-4499
Published on: Not Yet Published
Last Modified on: 01/19/2023 04:08:00 PM UTC
Certain versions of Archer C5 from Tp-link contain the following vulnerability:
TP-Link routers, Archer C5 and WR710N-V1, using the latest software, the strcmp function used for checking credentials in httpd, is susceptible to a side-channel attack. By measuring the response time of the httpd process, an attacker could guess each byte of the username and password.
- CVE-2022-4499 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
- Affected Vendor/Software:
TP-Link - WR710N version = V1-151022
- Affected Vendor/Software:
TP-Link - Archer C5 version = V2_160221_US
CVSS3 Score: 7.5 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
CERT Vulnerability Notes Database | kb.cert.org text/html Inactive LinkNot Archived |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Hardware
| Tp-link | Archer C5 | 2.0 | All | All | All |
Operating System | Tp-link | Archer C5 Firmware | 2_160201_us | All | All | All |
Hardware
| Tp-link | Tl-wr710n | 1.0 | All | All | All |
Operating System | Tp-link | Tl-wr710n Firmware | 1_151022_us | All | All | All |
- cpe:2.3:h:tp-link:archer_c5:2.0:*:*:*:*:*:*:*:
- cpe:2.3:o:tp-link:archer_c5_firmware:2_160201_us:*:*:*:*:*:*:*:
- cpe:2.3:h:tp-link:tl-wr710n:1.0:*:*:*:*:*:*:*:
- cpe:2.3:o:tp-link:tl-wr710n_firmware:1_151022_us:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-4499 : TP-Link routers, Archer C5 and WR710N-V1, using the latest software, the strcmp function used for c… twitter.com/i/web/status/1… | 2023-01-11 19:08:30 |
![]() |
CVE-2022-4499 | 2023-01-11 20:39:11 |