ID

VAR-202309-0275


CVE

CVE-2023-36489


TITLE

plural  TP-LINK Technologies  In the product  OS  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2023-011848

DESCRIPTION

Multiple TP-LINK products allow a network-adjacent unauthenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: TL-WR802N firmware versions prior to 'TL-WR802N(JP)_V4_221008', TL-WR841N firmware versions prior to 'TL-WR841N(JP)_V14_230506', and TL-WR902AC firmware versions prior to 'TL-WR902AC(JP)_V3_230506'. TP-LINK Technologies of TL-WR902AC firmware, TL-WR802N firmware, TL-WR841N The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2023-36489 // JVNDB: JVNDB-2023-011848

AFFECTED PRODUCTS

vendor:tp linkmodel:tl-wr841nscope:ltversion:230506

Trust: 1.0

vendor:tp linkmodel:tl-wr902acscope:ltversion:230506

Trust: 1.0

vendor:tp linkmodel:tl-wr802nscope:ltversion:221008

Trust: 1.0

vendor:tp linkmodel:tl-wr802nscope: - version: -

Trust: 0.8

vendor:tp linkmodel:tl-wr902acscope: - version: -

Trust: 0.8

vendor:tp linkmodel:tl-wr841nscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-011848 // NVD: CVE-2023-36489

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-36489
value: HIGH

Trust: 1.0

NVD: CVE-2023-36489
value: HIGH

Trust: 0.8

nvd@nist.gov: CVE-2023-36489
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2023-36489
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-011848 // NVD: CVE-2023-36489

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:OS Command injection (CWE-78) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-011848 // NVD: CVE-2023-36489

EXTERNAL IDS

db:NVDid:CVE-2023-36489

Trust: 2.6

db:JVNid:JVNVU99392903

Trust: 1.8

db:JVNDBid:JVNDB-2023-011848

Trust: 0.8

sources: JVNDB: JVNDB-2023-011848 // NVD: CVE-2023-36489

REFERENCES

url:https://jvn.jp/en/vu/jvnvu99392903/

Trust: 1.8

url:https://www.tp-link.com/jp/support/download/tl-wr802n/#firmware

Trust: 1.8

url:https://www.tp-link.com/jp/support/download/tl-wr841n/v14/#firmware

Trust: 1.8

url:https://www.tp-link.com/jp/support/download/tl-wr902ac/#firmware

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-36489

Trust: 0.8

sources: JVNDB: JVNDB-2023-011848 // NVD: CVE-2023-36489

SOURCES

db:JVNDBid:JVNDB-2023-011848
db:NVDid:CVE-2023-36489

LAST UPDATE DATE

2024-08-14T13:19:51.950000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2023-011848date:2023-12-14T06:40:00
db:NVDid:CVE-2023-36489date:2023-09-11T13:36:35.507

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2023-011848date:2023-12-14T00:00:00
db:NVDid:CVE-2023-36489date:2023-09-06T10:15:13.710