CVE-2021-41451

Published: Dic 17, 2021 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2021-28478 Aliases: GSD-2021-41451
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,5
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high
MEDIUM 5,0
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: none
Integrity: none
Availability: partial

Description

AI Translation Available

A misconfiguration in HTTP/1.0 and HTTP/1.1 of the web interface in TP-Link AX10v1 before V1_211117 allows a remote unauthenticated attacker to send a specially crafted HTTP request and receive a misconfigured HTTP/0.9 response, potentially leading into a cache poisoning attack.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0683
Percentile
0,9th
Updated

EPSS Score Trend (Last 90 Days)

444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

Incomplete
Common Consequences
Security Scopes Affected:
Integrity Non-Repudiation Access Control
Potential Impacts:
Unexpected State Hide Activities Bypass Protection Mechanism
Applicable Platforms
Technologies: Web Based, Web Server
View CWE Details
Operating System

Archer Ax10 Firmware by Tp-Link

Version Range Affected
To v1_211117 (exclusive)
cpe:2.3:o:tp-link:archer_ax10_firmware:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
http://ax10v1.com
Not Applicable URL Repurposed
http://ax10v1.com
https://www.tp-link.com/us/support/download/archer-ax10/v1/#Firmware
http://tp-link.com
http://ax10v1.com
Not Applicable URL Repurposed
http://ax10v1.com
https://www.tp-link.com/us/support/download/archer-ax10/v1/#Firmware
http://tp-link.com