ID

VAR-202102-1088


CVE

CVE-2021-27210


TITLE

TP-Link Archer C5v  Vulnerability of important information in plaintext

Trust: 0.8

sources: JVNDB: JVNDB-2021-003600

DESCRIPTION

TP-Link Archer C5v 1.7_181221 devices allows remote attackers to retrieve cleartext credentials via [USER_CFG#0,0,0,0,0,0#0,0,0,0,0,0]0,0 to the /cgi?1&5 URI. TP-Link Archer C5v Contains a vulnerability in the plaintext storage of important information.Information may be obtained. TP-Link Archer C5v is an AC1200 wireless dual-band Gigabit VoIP router. TP-Link Archer C5v 1.7_181221 has an information disclosure vulnerability

Trust: 2.16

sources: NVD: CVE-2021-27210 // JVNDB: JVNDB-2021-003600 // CNVD: CNVD-2021-12106

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-12106

AFFECTED PRODUCTS

vendor:tp linkmodel:archer c5vscope:eqversion:1.7_181221

Trust: 1.0

vendor:tp linkmodel:archer c5vscope:eqversion:archer c5v firmware 1.7_181221

Trust: 0.8

vendor:tp linkmodel:archer c5vscope:eqversion: -

Trust: 0.8

vendor:tp linkmodel:archer c5v 1.7 181221scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2021-12106 // JVNDB: JVNDB-2021-003600 // NVD: CVE-2021-27210

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-27210
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-27210
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2021-12106
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202102-1114
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2021-27210
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2021-12106
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2021-27210
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-27210
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-12106 // JVNDB: JVNDB-2021-003600 // CNNVD: CNNVD-202102-1114 // NVD: CVE-2021-27210

PROBLEMTYPE DATA

problemtype:CWE-312

Trust: 1.0

problemtype:Plaintext storage of important information (CWE-312) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-003600 // NVD: CVE-2021-27210

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202102-1114

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202102-1114

PATCH

title:Top Pageurl:https://www.tp-link.com/

Trust: 0.8

sources: JVNDB: JVNDB-2021-003600

EXTERNAL IDS

db:NVDid:CVE-2021-27210

Trust: 3.0

db:JVNDBid:JVNDB-2021-003600

Trust: 0.8

db:CNVDid:CNVD-2021-12106

Trust: 0.6

db:CNNVDid:CNNVD-202102-1114

Trust: 0.6

sources: CNVD: CNVD-2021-12106 // JVNDB: JVNDB-2021-003600 // CNNVD: CNNVD-202102-1114 // NVD: CVE-2021-27210

REFERENCES

url:https://gokay.org/tp-links-archer-c5v-improper-authorization/

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-27210

Trust: 2.0

sources: CNVD: CNVD-2021-12106 // JVNDB: JVNDB-2021-003600 // CNNVD: CNNVD-202102-1114 // NVD: CVE-2021-27210

SOURCES

db:CNVDid:CNVD-2021-12106
db:JVNDBid:JVNDB-2021-003600
db:CNNVDid:CNNVD-202102-1114
db:NVDid:CVE-2021-27210

LAST UPDATE DATE

2024-11-23T23:01:04.907000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-12106date:2021-02-24T00:00:00
db:JVNDBid:JVNDB-2021-003600date:2021-10-29T01:52:00
db:CNNVDid:CNNVD-202102-1114date:2021-02-25T00:00:00
db:NVDid:CVE-2021-27210date:2024-11-21T05:57:35.867

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-12106date:2021-02-24T00:00:00
db:JVNDBid:JVNDB-2021-003600date:2021-10-29T00:00:00
db:CNNVDid:CNNVD-202102-1114date:2021-02-12T00:00:00
db:NVDid:CVE-2021-27210date:2021-02-13T01:15:12.797