
CVE-2022-4498 – A vulnerable HTTP Basic Authentication process in TP-Link routers, Archer C5 and WR710N-V1, is susceptible to either a DoS or an arbitrary code execution via any interface.
https://notcve.org/view.php?id=CVE-2022-4498
11 Jan 2023 — In TP-Link routers, Archer C5 and WR710N-V1, running the latest available code, when receiving HTTP Basic Authentication the httpd service can be sent a crafted packet that causes a heap overflow. This can result in either a DoS (by crashing the httpd process) or an arbitrary code execution. • https://kb.cert.org/vuls/id/572615 • CWE-787: Out-of-bounds Write •

CVE-2022-4499 – The strcmp function in TP-Link routers, Archer C5 and WR710N-V1, used for checking credentials in httpd, is susceptible to a side-channel attack.
https://notcve.org/view.php?id=CVE-2022-4499
11 Jan 2023 — TP-Link routers, Archer C5 and WR710N-V1, using the latest software, the strcmp function used for checking credentials in httpd, is susceptible to a side-channel attack. By measuring the response time of the httpd process, an attacker could guess each byte of the username and password. • https://kb.cert.org/vuls/id/572615 • CWE-203: Observable Discrepancy •

CVE-2018-19537
https://notcve.org/view.php?id=CVE-2018-19537
26 Nov 2018 — TP-Link Archer C5 devices through V2_160201_US allow remote command execution via shell metacharacters on the wan_dyn_hostname line of a configuration file that is encrypted with the 478DA50BF9E3D2CF key and uploaded through the web GUI by using the web admin account. The default password of admin may be used in some cases. Los dispositivos TP-Link Archer C5 hasta la versión V2_160201_US permiten la ejecución de comandos mediante metacaracteres shell en la línea wan_dyn_hostname de un archivo de configuraci... • https://github.com/JackDoan/TP-Link-ArcherC5-RCE • CWE-434: Unrestricted Upload of File with Dangerous Type •