CVE-2021-28858

TP-Link's TL-WPA4220 4.0.2 Build 20180308 Rel.37064 does not use SSL by default. Attacker on the local network can monitor traffic and capture the cookie and other sensitive information.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tl-wpa4220_firmware:4.0.2:build_20180308_rel.37064:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wpa4220:4.0:*:*:*:*:*:*:*

History

23 Jun 2021, 19:49

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 2.1
v3 : 5.5
CPE cpe:2.3:h:tp-link:tl-wpa4220:4.0:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tl-wpa4220_firmware:4.0.2:build_20180308_rel.37064:*:*:*:*:*:*
CWE CWE-312
References (MISC) https://yunus-shn.medium.com/tp-links-tl-wpa4220-v4-0-cleartext-transmission-of-sensitive-information-40357c778b84 - (MISC) https://yunus-shn.medium.com/tp-links-tl-wpa4220-v4-0-cleartext-transmission-of-sensitive-information-40357c778b84 - Exploit, Third Party Advisory

15 Jun 2021, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-15 22:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-28858

Mitre link : CVE-2021-28858

CVE.ORG link : CVE-2021-28858


JSON object : View

Products Affected

tp-link

  • tl-wpa4220_firmware
  • tl-wpa4220
CWE
CWE-312

Cleartext Storage of Sensitive Information