CVE-2021-28858

TP-Link's TL-WPA4220 4.0.2 Build 20180308 Rel.37064 does not use SSL by default. Attacker on the local network can monitor traffic and capture the cookie and other sensitive information.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tl-wpa4220_firmware:4.0.2:build_20180308_rel.37064:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wpa4220:4.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:00

Type Values Removed Values Added
References () https://yunus-shn.medium.com/tp-links-tl-wpa4220-v4-0-cleartext-transmission-of-sensitive-information-40357c778b84 - Exploit, Third Party Advisory () https://yunus-shn.medium.com/tp-links-tl-wpa4220-v4-0-cleartext-transmission-of-sensitive-information-40357c778b84 - Exploit, Third Party Advisory

Information

Published : 2021-06-15 22:15

Updated : 2024-11-21 06:00


NVD link : CVE-2021-28858

Mitre link : CVE-2021-28858

CVE.ORG link : CVE-2021-28858


JSON object : View

Products Affected

tp-link

  • tl-wpa4220_firmware
  • tl-wpa4220
CWE
CWE-312

Cleartext Storage of Sensitive Information