CVE-2021-41450

Published: Dic 08, 2021 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2021-28477 Aliases: GSD-2021-41450
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,5
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high
MEDIUM 5,0
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: none
Integrity: none
Availability: partial

Description

AI Translation Available

An HTTP request smuggling attack in TP-Link AX10v1 before v1_211117 allows a remote unauthenticated attacker to DoS the web application via sending a specific HTTP packet.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0596
Percentile
0,9th
Updated

EPSS Score Trend (Last 90 Days)

444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

Incomplete
Common Consequences
Security Scopes Affected:
Integrity Non-Repudiation Access Control
Potential Impacts:
Unexpected State Hide Activities Bypass Protection Mechanism
Applicable Platforms
Technologies: Web Based, Web Server
View CWE Details
Operating System

Archer Ax10 V1 Firmware by Tp-Link

Version Range Affected
To 211117 (exclusive)
cpe:2.3:o:tp-link:archer_ax10_v1_firmware:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
http://ax10v1.com
Broken Link URL Repurposed
http://ax10v1.com
https://www.tp-link.com/us/support/download/archer-ax10/v1/#Firmware
http://tp-link.com
Vendor Advisory
http://tp-link.com
http://ax10v1.com
Broken Link URL Repurposed
http://ax10v1.com
https://www.tp-link.com/us/support/download/archer-ax10/v1/#Firmware
http://tp-link.com
Vendor Advisory
http://tp-link.com