{ "schema_version": "1.4.0", "id": "GHSA-frjm-wvvg-4gw5", "modified": "2022-05-13T01:42:23Z", "published": "2022-05-13T01:42:23Z", "aliases": [ "CVE-2017-11519" ], "details": "passwd_recovery.lua on the TP-Link Archer C9(UN)_V2_160517 allows an attacker to reset the admin password by leveraging a predictable random number generator seed. This is fixed in C9(UN)_V2_170511.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11519" }, { "type": "WEB", "url": "https://devcraft.io/posts/2017/07/21/tp-link-archer-c9-admin-password-reset.html" }, { "type": "WEB", "url": "http://www.tp-link.com/en/download/Archer-C9_V2.html#Firmware" } ], "database_specific": { "cwe_ids": [ "CWE-335" ], "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-07-21T21:29:00Z" } }