Inadequate Encryption Strength vulnerability in TP-Link Archer C7 v5 and v5.8 (uhttpd modules) allows Password Recovery Exploitation. The web interface encrypts the admin password client-side using RSA-1024 before sending it to the router during login. 
An adjacent attacker with the ability to intercept network traffic could potentially perform a brute-force or factorization attack against the 1024-bit RSA key to recover the plaintext administrator password, leading to unauthorized access and compromise of the device configuration.  This issue affects Archer C7: through Build 20220715.

Project Subscriptions

Vendors Products
Tp-link Subscribe
Archer C7 Subscribe
Archer C7 Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 06 May 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link archer C7 Firmware
CPEs cpe:2.3:h:tp-link:archer_c7:5.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_c7:5.80:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:archer_c7_firmware:-:*:*:*:*:*:*:*
Vendors & Products Tp-link archer C7 Firmware
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 16 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Apr 2026 01:45:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link archer C7
Vendors & Products Tp-link
Tp-link archer C7

Thu, 16 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Inadequate Encryption Strength vulnerability in TP-Link Archer C7 v5 and v5.8 (uhttpd modules) allows Password Recovery Exploitation. The web interface encrypts the admin password client-side using RSA-1024 before sending it to the router during login.  An adjacent attacker with the ability to intercept network traffic could potentially perform a brute-force or factorization attack against the 1024-bit RSA key to recover the plaintext administrator password, leading to unauthorized access and compromise of the device configuration.  This issue affects Archer C7: through Build 20220715.
Title Use of weak cryptographic key in TP-Link Archer C7
Weaknesses CWE-326
References
Metrics cvssV4_0

{'score': 5.4, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-04-16T23:10:46.170Z

Reserved: 2026-04-01T17:38:27.536Z

Link: CVE-2026-5363

cve-icon Vulnrichment

Updated: 2026-04-16T13:17:41.905Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-16T00:16:29.547

Modified: 2026-05-06T14:08:58.067

Link: CVE-2026-5363

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T02:15:21Z

Weaknesses