cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2021-27209,https://securityvulnerability.io/vulnerability/CVE-2021-27209,Cleartext HTTP Vulnerability in TP-Link Archer C5v Management Interface,"The management interface of the TP-Link Archer C5v 1.7_181221 device is vulnerable due to the transmission of user credentials in base64 format over cleartext HTTP. This lack of proper encryption puts sensitive user information at risk, as it can be intercepted during transmission by potential attackers. It is crucial for users of affected devices to secure their networks and apply necessary updates to ensure data confidentiality.",Tp-link,Archer C5v Firmware,7.1,HIGH,0.0004799999878741801,false,,false,false,false,,,false,false,,2021-02-13T00:05:15.000Z,0 CVE-2021-27210,https://securityvulnerability.io/vulnerability/CVE-2021-27210,Remote Authentication Bypass in TP-Link Archer C5v Devices,"The TP-Link Archer C5v 1.7_181221 devices are susceptible to an improper authorization vulnerability, allowing remote attackers to access sensitive information. By exploiting this flaw, attackers can retrieve cleartext user credentials through a specifically crafted URI, enabling potential unauthorized access and compromise of the device's settings. This highlights the importance of securing these devices against unauthorized access to protect user data.",Tp-link,Archer C5v Firmware,6.5,MEDIUM,0.0026400000788271427,false,,false,false,false,,,false,false,,2021-02-13T00:04:57.000Z,0