Vulnerability CVE-2017-11519


Published: 2017-07-21   Modified: 2017-07-22

Description:
passwd_recovery.lua on the TP-Link Archer C9(UN)_V2_160517 allows an attacker to reset the admin password by leveraging a predictable random number generator seed. This is fixed in C9(UN)_V2_170511.

Type:

CWE-335

(PRNG Seed Error)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Tp-link -> Archer c9 (2.0) firmware 

 References:
http://www.tp-link.com/en/download/Archer-C9_V2.html#Firmware
https://devcraft.io/posts/2017/07/21/tp-link-archer-c9-admin-password-reset.html

Copyright 2024, cxsecurity.com

 

Back to Top