← Zuruck zu CVEs
CVE-2022-4499
HIGH7.5
Beschreibung
TP-Link routers, Archer C5 and WR710N-V1, using the latest software, the strcmp function used for checking credentials in httpd, is susceptible to a side-channel attack. By measuring the response time of the httpd process, an attacker could guess each byte of the username and password.
CVE Details
CVSS v3.1 Bewertung7.5
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht1/11/2023
Zuletzt geandert11/4/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
tp-link:archer_c5tp-link:archer_c5_firmwaretp-link:tl-wr710ntp-link:tl-wr710n_firmware
Schwachen (CWE)
CWE-203
Referenzen
https://kb.cert.org/vuls/id/572615(cret@cert.org)
https://kb.cert.org/vuls/id/572615(af854a3a-2127-422b-91ae-364da2661108)
https://www.kb.cert.org/vuls/id/572615(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.