Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2017-11519
passwd_recovery.lua on the TP-Link Archer C9(UN)_V2_160517 allows an attacker to reset the admin password by leveraging a predictable random number generator seed. This is fixed in C9(UN)_V2_170511.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.132
EPSS Ranking
93.8%
CVSS Severity
CVSS v3 Score
9.8
CVSS v2 Score
5.0
References
http://www.tp-link.com/en/download/Archer-C9_V2.html#Firmware
https://devcraft.io/posts/2017/07/21/tp-link-archer-c9-admin-password-reset.html
http://www.tp-link.com/en/download/Archer-C9_V2.html#Firmware
https://devcraft.io/posts/2017/07/21/tp-link-archer-c9-admin-password-reset.html
Products affected by CVE-2017-11519
Tp-Link
»
Archer C9 (2.0)
»
Version:
N/A
cpe:2.3:h:tp-link:archer_c9_(2.0):-
Tp-Link
»
Archer C9 (2.0) Firmware
»
Version:
160517
cpe:2.3:o:tp-link:archer_c9_(2.0)_firmware:160517
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved