7.8

CVE-2015-3035

Warnung
Medienbericht
Exploit
Directory traversal vulnerability in TP-LINK Archer C5 (1.2) with firmware before 150317, C7 (2.0) with firmware before 150304, and C8 (1.0) with firmware before 150316, Archer C9 (1.0), TL-WDR3500 (1.0), TL-WDR3600 (1.0), and TL-WDR4300 (1.0) with firmware before 150302, TL-WR740N (5.0) and TL-WR741ND (5.0) with firmware before 150312, and TL-WR841N (9.0), TL-WR841N (10.0), TL-WR841ND (9.0), and TL-WR841ND (10.0) with firmware before 150310 allows remote attackers to read arbitrary files via a .. (dot dot) in the PATH_INFO to login/.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Tp-linkTl-wr741nd Firmware Version < 150312
   Tp-linkTl-wr741nd Version5
Tp-linkTl-wr841n Firmware Version < 150310
   Tp-linkTl-wr841n Version9
Tp-linkTl-wr740n Firmware Version < 150312
   Tp-linkTl-wr740n Version5
Tp-linkArcher C5 Firmware Version < 150317
   Tp-linkArcher C5 Version1.20
Tp-linkTl-wr841n Firmware Version < 150310
   Tp-linkTl-wr841n Version10
Tp-linkTl-wdr3600 Firmware Version < 150302
   Tp-linkTl-wdr3600 Version1
Tp-linkArcher C7 Firmware Version < 150304
   Tp-linkArcher C7 Version2
Tp-linkTl-wr841nd Firmware Version < 150310
   Tp-linkTl-wr841nd Version10
Tp-linkArcher C9 Firmware Version < 150302
   Tp-linkArcher C9 Version1
Tp-linkTl-wr841nd Firmware Version < 150310
   Tp-linkTl-wr841nd Version9
Tp-linkArcher C8 Firmware Version < 150316
   Tp-linkArcher C8 Version1
Tp-linkTl-wdr4300 Firmware Version < 150302
   Tp-linkTl-wdr4300 Version1
Tp-linkTl-wdr3500 Firmware Version < 150302
   Tp-linkTl-wdr3500 Version1

25.03.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

TP-Link Multiple Archer Devices Directory Traversal Vulnerability

Schwachstelle

Directory traversal vulnerability in multiple TP-Link Archer devices allows remote attackers to read arbitrary files via a .. (dot dot) in the PATH_INFO to login/.

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 93.13% 0.998
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
nvd@nist.gov 7.8 10 6.9
AV:N/AC:L/Au:N/C:C/I:N/A:N
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

http://seclists.org/fulldisclosure/2015/Apr/26
Third Party Advisory
Exploit
Mailing List
http://www.securityfocus.com/archive/1/535240/100/0/threaded
Third Party Advisory
Broken Link
VDB Entry
http://www.securityfocus.com/bid/74050
Third Party Advisory
Broken Link
VDB Entry