9.8
CVSSv3

CVE-2018-11714

Published: 04/06/2018 Updated: 31/07/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An issue exists on TP-Link TL-WR840N v5 00000005 0.9.1 3.16 v0001.0 Build 170608 Rel.58696n and TL-WR841N v13 00000013 0.9.1 4.16 v0001.0 Build 170622 Rel.64334n devices. This issue is caused by improper session handling on the /cgi/ folder or a /cgi file. If an attacker sends a header of "Referer: 192.168.0.1/mainFrame.htm" then no authentication is required for any action.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tp-link tl-wr840n_firmware 0.9.1_3.16

tp-link tl-wr841n_firmware 0.9.1_4.16

Github Repositories

TPLINK TL-WR840N Proof Of Concept. This issue affect firmware file. So we can get the backup configuration file and gain access to Admin panel

TPLINK TL-WR840N Exploit This is Proof Of Concept based on CVE-2018-11714 which was found by Touhid Shaikh This Issue is caused by broken session handling on firmware /cgi/ directory That allow us to download the configuration file and gain access to admin configuration panel This issue affect firmware 091 316 v00010 Build 170608 Rel58696n And it hasn't been repa