An adjacent attacker with the ability to intercept network traffic could potentially perform a brute-force or factorization attack against the 1024-bit RSA key to recover the plaintext administrator password, leading to unauthorized access and compromise of the device configuration. This issue affects Archer C7: through Build 20220715.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.tp-link.com/us/support/faq/3562/ |
|
Wed, 06 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link archer C7 Firmware
|
|
| CPEs | cpe:2.3:h:tp-link:archer_c7:5.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_c7:5.80:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_c7_firmware:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tp-link archer C7 Firmware
|
|
| Metrics |
cvssV3_1
|
Thu, 16 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 16 Apr 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link archer C7 |
|
| Vendors & Products |
Tp-link
Tp-link archer C7 |
Thu, 16 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Inadequate Encryption Strength vulnerability in TP-Link Archer C7 v5 and v5.8 (uhttpd modules) allows Password Recovery Exploitation. The web interface encrypts the admin password client-side using RSA-1024 before sending it to the router during login. An adjacent attacker with the ability to intercept network traffic could potentially perform a brute-force or factorization attack against the 1024-bit RSA key to recover the plaintext administrator password, leading to unauthorized access and compromise of the device configuration. This issue affects Archer C7: through Build 20220715. | |
| Title | Use of weak cryptographic key in TP-Link Archer C7 | |
| Weaknesses | CWE-326 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-04-16T23:10:46.170Z
Reserved: 2026-04-01T17:38:27.536Z
Link: CVE-2026-5363
Updated: 2026-04-16T13:17:41.905Z
Status : Undergoing Analysis
Published: 2026-04-16T00:16:29.547
Modified: 2026-05-06T14:08:58.067
Link: CVE-2026-5363
No data.
OpenCVE Enrichment
Updated: 2026-04-16T02:15:21Z