TP-Link.Archer.C5.Admin.Password.Reset

description-logoDescription

This indicates an attack attempt to exploit a Password Reset Vulnerability in TP-Link Archer C5.
The vulnerability is due to an error in the vulnerable application when handling a maliciously crafted request. A remote attacker may be able to exploit this to void the passwords of admin users on the affected system.

affected-products-logoAffected Products

TP-Link Archer C5 v4 routers with firmware 3.16.0 0.9.1 v600c.0 Build 180124 Rel.28919n
TP-Link Archer MR200v4
TP-Link Archer MR6400v4
TP-Link Archer MR400v3

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor:
https://www.tp-link.com/us/support/download/

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-01-17 15.760 Default_action:pass:drop
2020-01-07 15.753