Description
Inadequate Encryption Strength vulnerability in TP-Link Archer C7 v5 and v5.8 (uhttpd modules) allows Password Recovery Exploitation. The web interface encrypts the admin password client-side using RSA-1024 before sending it to the router during login. 
An adjacent attacker with the ability to intercept network traffic could potentially perform a brute-force or factorization attack against the 1024-bit RSA key to recover the plaintext administrator password, leading to unauthorized access and compromise of the device configuration.  This issue affects Archer C7: through Build 20220715.
Published: 2026-04-15
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access via Password Recovery
Action: Apply Firmware Update
AI Analysis

Impact

The vulnerability arises from the router’s client‑side login form encrypting the administrator password with a 1024‑bit RSA key before sending it over the network. An attacker who can capture that traffic could use brute‑force or factorization techniques to recover the plaintext password, thereby gaining full administrative control and the ability to modify the device’s configuration. The weakness is classified as inadequate encryption strength (CWE‑326).

Affected Systems

TP‑Link Systems Inc. models Archer C7 running firmware versions 5 and 5.8, up to build 20220715.

Risk and Exploitability

The CVSS base score of 5.4 indicates moderate severity. Exploitability data is not available, and the vulnerability is not currently listed in the CISA KEV catalog. The likely attack vector is a network attacker able to intercept traffic between a legitimate client and the router, which could then mount a brute‑force or factorization effort against the weak RSA key. The real‑world risk depends on the attacker’s computational resources and whether the router is exposed to untrusted networks.

Generated by OpenCVE AI on April 16, 2026 at 02:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router to the latest firmware that removes the weak RSA key from the login process
  • If an update is not yet available, disable remote access and ensure the router is accessed only over a secure local connection
  • Change the administrator password to a strong, unique value and enforce local password policies

Generated by OpenCVE AI on April 16, 2026 at 02:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Apr 2026 01:45:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link archer C7
Vendors & Products Tp-link
Tp-link archer C7

Thu, 16 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Inadequate Encryption Strength vulnerability in TP-Link Archer C7 v5 and v5.8 (uhttpd modules) allows Password Recovery Exploitation. The web interface encrypts the admin password client-side using RSA-1024 before sending it to the router during login.  An adjacent attacker with the ability to intercept network traffic could potentially perform a brute-force or factorization attack against the 1024-bit RSA key to recover the plaintext administrator password, leading to unauthorized access and compromise of the device configuration.  This issue affects Archer C7: through Build 20220715.
Title Use of weak cryptographic key in TP-Link Archer C7
Weaknesses CWE-326
References
Metrics cvssV4_0

{'score': 5.4, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tp-link Archer C7
cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-04-16T23:10:46.170Z

Reserved: 2026-04-01T17:38:27.536Z

Link: CVE-2026-5363

cve-icon Vulnrichment

Updated: 2026-04-16T13:17:41.905Z

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T02:15:21Z

Weaknesses