TP-Link AX10v1 V1_211117 allows attackers to execute a replay attack by using a previously transmitted encrypted authentication message and valid authentication token. Attackers are able to login to the web application as an admin user.
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).
Link | Tags |
---|---|
https://www.tp-link.com/us/support/download/archer-ax10/v1/#Firmware | product vendor advisory |
https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/Replay | third party advisory exploit |