CVE-2017-9466
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The executable httpd on the TP-Link WR841N V8 router before TL-WR841N(UN)_V8_170210 contained a design flaw in the use of DES for block encryption. This resulted in incorrect access control, which allowed attackers to gain read-write access to system settings through the protected router configuration service tddp via the LAN and Ath0 (Wi-Fi) interfaces.
El httpd ejecutable en el router TP-Link WR841N V8, en versiones anteriores a la TL-WR841N(UN)_V8_170210, contiene un fallo de diseño en el uso de DES para el cifrado en bloque. Esto resultó en un control de acceso incorrecto, lo que permitía que atacantes obtuviesen acceso de lectura-escritura a las opciones del sistema mediante el servicio de configuración del router protegido tddp mediante las interfaces LAN y Ath0 (Wi-Fi).
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-06-06 CVE Reserved
- 2017-06-26 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
http://blog.senr.io/blog/cve-2017-9466-why-is-my-router-blinking-morse-code | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tp-link Search vendor "Tp-link" | Wr841n V8 Firmware Search vendor "Tp-link" for product "Wr841n V8 Firmware" | <= tl-wr841n_v8_140724 Search vendor "Tp-link" for product "Wr841n V8 Firmware" and version " <= tl-wr841n_v8_140724" | - |
Affected
| in | Tp-link Search vendor "Tp-link" | Wr841n V8 Search vendor "Tp-link" for product "Wr841n V8" | - | - |
Safe
|