TP-Link routers, Archer C5 and WR710N-V1, using the...
High severity
Unreviewed
Published
Jan 11, 2023
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Jan 11, 2023
Published to the GitHub Advisory Database
Jan 11, 2023
Last updated
Jan 27, 2023
TP-Link routers, Archer C5 and WR710N-V1, using the latest software, the strcmp function used for checking credentials in httpd, is susceptible to a side-channel attack. By measuring the response time of the httpd process, an attacker could guess each byte of the username and password.
References