CVE-2021-28857

TP-Link's TL-WPA4220 4.0.2 Build 20180308 Rel.37064 username and password are sent via the cookie.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tl-wpa4220_firmware:4.0.2:build_20180308_rel.37064:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wpa4220:4.0:*:*:*:*:*:*:*

History

23 Jun 2021, 19:47

Type Values Removed Values Added
CPE cpe:2.3:o:tp-link:tl-wpa4220_firmware:4.0.2:build_20180308_rel.37064:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wpa4220:4.0:*:*:*:*:*:*:*
References (MISC) https://yunus-shn.medium.com/tp-links-tl-wpa4220-v4-0-cleartext-credentials-in-cookie-7516a2649394 - (MISC) https://yunus-shn.medium.com/tp-links-tl-wpa4220-v4-0-cleartext-credentials-in-cookie-7516a2649394 - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CWE CWE-522

15 Jun 2021, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-15 22:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-28857

Mitre link : CVE-2021-28857

CVE.ORG link : CVE-2021-28857


JSON object : View

Products Affected

tp-link

  • tl-wpa4220
  • tl-wpa4220_firmware
CWE
CWE-522

Insufficiently Protected Credentials