TP-Link.Archer.C5.Admin.Password.Reset
Description
This indicates an attack attempt to exploit a Password Reset Vulnerability in TP-Link Archer C5.
The vulnerability is due to an error in the vulnerable application when handling a maliciously crafted request. A remote attacker may be able to exploit this to void the passwords of admin users on the affected system.
Affected Products
TP-Link Archer C5 v4 routers with firmware 3.16.0 0.9.1 v600c.0 Build 180124 Rel.28919n
TP-Link Archer MR200v4
TP-Link Archer MR6400v4
TP-Link Archer MR400v3
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor:
https://www.tp-link.com/us/support/download/
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |