The web app client of TP-Link AX10v1 V1_211117 uses hard-coded cryptographic keys when communicating with the router. Attackers who are able to intercept the communications between the web client and router through a man-in-the-middle attack can then obtain the sequence key via a brute-force attack, and access sensitive information.
History

Thu, 15 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2022-10-18T00:00:00.000Z

Updated: 2025-05-15T14:59:23.252Z

Reserved: 2022-09-26T00:00:00.000Z

Link: CVE-2022-41540

cve-icon Vulnrichment

Updated: 2024-08-03T12:42:46.237Z

cve-icon NVD

Status : Modified

Published: 2022-10-18T15:15:10.197

Modified: 2025-05-15T15:16:06.077

Link: CVE-2022-41540

cve-icon Redhat

No data.