Description
The web app client of TP-Link AX10v1 V1_211117 uses hard-coded cryptographic keys when communicating with the router. Attackers who are able to intercept the communications between the web client and router through a man-in-the-middle attack can then obtain the sequence key via a brute-force attack, and access sensitive information.
Exploits (1)
References (2)
Core 2
Core References
Exploit, Third Party Advisory
https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/Offline-decryption
Product, Vendor Advisory
https://www.tp-link.com/us/support/download/archer-ax10/v1/#Firmware
Scores
CVSS v3
5.9
EPSS
0.0415
EPSS Percentile
88.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-798
Status
published
Products (1)
tp-link/ax10_firmware
v1_211117
Published
Oct 18, 2022
Tracked Since
Feb 18, 2026