A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in TP-Link AX10v1 before V1_211014, allows a remote unauthenticated attacker to disconnect an already connected wireless client via sending with a wireless adapter specific spoofed authentication frames
                
            References
                    | Link | Resource | 
|---|---|
| https://www.tp-link.com/us/support/download/archer-ax10/v1/#Firmware | Mitigation Patch Vendor Advisory | 
| https://www.tp-link.com/us/support/download/archer-ax10/v1/#Firmware | Mitigation Patch Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 06:23
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.tp-link.com/us/support/download/archer-ax10/v1/#Firmware - Mitigation, Patch, Vendor Advisory | 
08 Aug 2023, 14:22
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-290 | 
10 Dec 2021, 13:29
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:o:tp-link:archer_ax10_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_ax10:v1:*:*:*:*:*:*:* | |
| References | (MISC) https://www.tp-link.com/us/support/download/archer-ax10/v1/#Firmware - Mitigation, Patch, Vendor Advisory | |
| CVSS | v2 : v3 : | v2 : 7.8 v3 : 7.5 | 
| CWE | CWE-668 | 
07 Dec 2021, 20:31
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2021-12-07 20:15
Updated : 2024-11-21 06:23
NVD link : CVE-2021-40288
Mitre link : CVE-2021-40288
CVE.ORG link : CVE-2021-40288
JSON object : View
Products Affected
                tp-link
- archer_ax10
- archer_ax10_firmware
CWE
                
                    
                        
                        CWE-290
                        
            Authentication Bypass by Spoofing
