7.8
CVSSv2

CVE-2015-3035

Published: 22/04/2015 Updated: 09/10/2018
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 695
Vector: AV:N/AC:L/Au:N/C:C/I:N/A:N

Vulnerability Summary

Directory traversal vulnerability in TP-LINK Archer C5 (1.2) with firmware prior to 150317, C7 (2.0) with firmware prior to 150304, and C8 (1.0) with firmware prior to 150316, Archer C9 (1.0), TL-WDR3500 (1.0), TL-WDR3600 (1.0), and TL-WDR4300 (1.0) with firmware prior to 150302, TL-WR740N (5.0) and TL-WR741ND (5.0) with firmware prior to 150312, and TL-WR841N (9.0), TL-WR841N (10.0), TL-WR841ND (9.0), and TL-WR841ND (10.0) with firmware prior to 150310 allows remote malicious users to read arbitrary files via a .. (dot dot) in the PATH_INFO to login/.

Vulnerable Product Search on Vulmon Subscribe to Product

tp-link tl-wr841n (9.0) firmware

tp-link tl-wr740n (5.0) firmware

tp-link archer c5 (1.2) firmware

tp-link tl-wr841n (10.0) firmware

tp-link tl-wr741nd (5.0) firmware

tp-link tl-wr741nd (5.0)

tp-link tl-wdr3600 (1.0) firmware

tp-link archer c7 (2.0) firmware

tp-link tl-wr841nd (10.0) firmware 150104

tp-link archer c9 (1.0) firmware

tp-link tl-wr841nd (9.0) firmware

tp-link archer c8 (1.0) firmware

tp-link tl-wdr4300 (1.0) firmware

tp-link tl-wdr3500 (1.0) firmware

Exploits

Multiple TP-LINK products suffer from a local file disclosure vulnerability ...