Description
TP-Link routers, Archer C5 and WR710N-V1, using the latest software, the strcmp function used for checking credentials in httpd, is susceptible to a side-channel attack. By measuring the response time of the httpd process, an attacker could guess each byte of the username and password.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-51840 | TP-Link routers, Archer C5 and WR710N-V1, using the latest software, the strcmp function used for checking credentials in httpd, is susceptible to a side-channel attack. By measuring the response time of the httpd process, an attacker could guess each byte of the username and password. |
References
History
Tue, 04 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 09 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2025-11-04T19:14:15.425Z
Reserved: 2022-12-14T18:09:49.250Z
Link: CVE-2022-4499
Updated: 2025-11-04T19:14:15.425Z
Status : Modified
Published: 2023-01-11T19:15:10.170
Modified: 2025-11-04T20:16:15.397
Link: CVE-2022-4499
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD