ID

VAR-202012-1159


CVE

CVE-2020-35575


TITLE

plural  TP-LINK Technologies  Product vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2020-018228

DESCRIPTION

A password-disclosure issue in the web interface on certain TP-Link devices allows a remote attacker to get full administrative access to the web panel. This affects WA901ND devices before 3.16.9(201211) beta, and Archer C5, Archer C7, MR3420, MR6400, WA701ND, WA801ND, WDR3500, WDR3600, WE843N, WR1043ND, WR1045ND, WR740N, WR741ND, WR749N, WR802N, WR840N, WR841HP, WR841N, WR842N, WR842ND, WR845N, WR940N, WR941HP, WR945N, WR949N, and WRD4300 devices. TP-LINK Technologies There are unspecified vulnerabilities in the product.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2020-35575 // JVNDB: JVNDB-2020-018228 // VULMON: CVE-2020-35575

AFFECTED PRODUCTS

vendor:tp linkmodel:wr802nscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:wr1045ndscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:wr949nscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:wa701ndscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:wdr3600scope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:wr945nscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:wr941hpscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:archer c7scope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:wr1043ndscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:wr841hpscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:wr740nscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:wr845nscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:mr3420scope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:mr6400scope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:wrd4300scope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:wdr3500scope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:wa801ndscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:wa901ndscope:ltversion:3.16.9\(201211\)_beta

Trust: 1.0

vendor:tp linkmodel:wr741ndscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:we843nscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:wr842ndscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:wr841nscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:archer c5scope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:wr940nscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:wr840nscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:wr842nscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:wr749nscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:mr3420scope: - version: -

Trust: 0.8

vendor:tp linkmodel:wr741ndscope: - version: -

Trust: 0.8

vendor:tp linkmodel:wdr3600scope: - version: -

Trust: 0.8

vendor:tp linkmodel:we843nscope: - version: -

Trust: 0.8

vendor:tp linkmodel:wa701ndscope: - version: -

Trust: 0.8

vendor:tp linkmodel:wa901ndscope: - version: -

Trust: 0.8

vendor:tp linkmodel:mr6400scope: - version: -

Trust: 0.8

vendor:tp linkmodel:wr1045ndscope: - version: -

Trust: 0.8

vendor:tp linkmodel:wr840nscope: - version: -

Trust: 0.8

vendor:tp linkmodel:wr749nscope: - version: -

Trust: 0.8

vendor:tp linkmodel:wr841nscope: - version: -

Trust: 0.8

vendor:tp linkmodel:archer c5scope: - version: -

Trust: 0.8

vendor:tp linkmodel:wr802nscope: - version: -

Trust: 0.8

vendor:tp linkmodel:wa801ndscope: - version: -

Trust: 0.8

vendor:tp linkmodel:wr1043ndscope: - version: -

Trust: 0.8

vendor:tp linkmodel:archer c7scope: - version: -

Trust: 0.8

vendor:tp linkmodel:wr841hpscope: - version: -

Trust: 0.8

vendor:tp linkmodel:wdr3500scope: - version: -

Trust: 0.8

vendor:tp linkmodel:wr740nscope: - version: -

Trust: 0.8

vendor:tp linkmodel:wr842nscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-018228 // NVD: CVE-2020-35575

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-35575
value: CRITICAL

Trust: 1.0

NVD: CVE-2020-35575
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202012-1558
value: CRITICAL

Trust: 0.6

VULMON: CVE-2020-35575
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-35575
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2020-35575
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2020-35575
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2020-35575 // JVNDB: JVNDB-2020-018228 // CNNVD: CNNVD-202012-1558 // NVD: CVE-2020-35575

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-018228 // NVD: CVE-2020-35575

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202012-1558

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-202012-1558

PATCH

title:Multiple Tp-Link Repair measures for router product information leakage vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138203

Trust: 0.6

sources: CNNVD: CNNVD-202012-1558

EXTERNAL IDS

db:NVDid:CVE-2020-35575

Trust: 3.3

db:PACKETSTORMid:163274

Trust: 2.5

db:JVNDBid:JVNDB-2020-018228

Trust: 0.8

db:EXPLOIT-DBid:50058

Trust: 0.6

db:CNNVDid:CNNVD-202012-1558

Trust: 0.6

db:VULMONid:CVE-2020-35575

Trust: 0.1

sources: VULMON: CVE-2020-35575 // JVNDB: JVNDB-2020-018228 // CNNVD: CNNVD-202012-1558 // NVD: CVE-2020-35575

REFERENCES

url:http://packetstormsecurity.com/files/163274/tp-link-tl-wr841n-command-injection.html

Trust: 3.2

url:https://pastebin.com/f8auudck

Trust: 2.5

url:https://www.tp-link.com/us/security

Trust: 2.5

url:https://static.tp-link.com/2020/202012/20201214/wa901ndv5_eu_3_16_9_up_boot%28201211%29.zip

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-35575

Trust: 1.4

url:https://static.tp-link.com/2020/202012/20201214/wa901ndv5_eu_3_16_9_up_boot(201211).zip

Trust: 0.7

url:https://www.exploit-db.com/exploits/50058

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2020-35575 // JVNDB: JVNDB-2020-018228 // CNNVD: CNNVD-202012-1558 // NVD: CVE-2020-35575

SOURCES

db:VULMONid:CVE-2020-35575
db:JVNDBid:JVNDB-2020-018228
db:CNNVDid:CNNVD-202012-1558
db:NVDid:CVE-2020-35575

LAST UPDATE DATE

2024-11-23T22:05:18.002000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2020-35575date:2021-09-07T00:00:00
db:JVNDBid:JVNDB-2020-018228date:2024-07-18T01:07:00
db:CNNVDid:CNNVD-202012-1558date:2021-06-28T00:00:00
db:NVDid:CVE-2020-35575date:2024-11-21T05:27:36.917

SOURCES RELEASE DATE

db:VULMONid:CVE-2020-35575date:2020-12-26T00:00:00
db:JVNDBid:JVNDB-2020-018228date:2024-07-18T00:00:00
db:CNNVDid:CNNVD-202012-1558date:2020-12-25T00:00:00
db:NVDid:CVE-2020-35575date:2020-12-26T02:15:12.870