CVE-2018-11714
Summary
| CVE | CVE-2018-11714 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-06-04 14:29:00 UTC |
| Updated | 2018-07-31 19:47:00 UTC |
| Description | An issue was discovered on TP-Link TL-WR840N v5 00000005 0.9.1 3.16 v0001.0 Build 170608 Rel.58696n and TL-WR841N v13 00000013 0.9.1 4.16 v0001.0 Build 170622 Rel.64334n devices. This issue is caused by improper session handling on the /cgi/ folder or a /cgi file. If an attacker sends a header of "Referer: http://192.168.0.1/mainFrame.htm" then no authentication is required for any action. |
Risk And Classification
Problem Types: CWE-384
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Tp-link | Tl-wr840n | 5.0 | All | All | All |
| Hardware | Tp-link | Tl-wr840n | 5.0 | All | All | All |
| Operating System | Tp-link | Tl-wr840n Firmware | 0.9.1_3.16 | All | All | All |
| Operating System | Tp-link | Tl-wr840n Firmware | 0.9.1_3.16 | All | All | All |
| Hardware | Tp-link | Tl-wr841n | 13.0 | All | All | All |
| Hardware | Tp-link | Tl-wr841n | 13.0 | All | All | All |
| Operating System | Tp-link | Tl-wr841n Firmware | 0.9.1_4.16 | All | All | All |
| Operating System | Tp-link | Tl-wr841n Firmware | 0.9.1_4.16 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| TP-Link TL-WR840N/TL-WR841N - Authenticaton Bypass - Hardware webapps Exploit | EXPLOIT-DB | www.exploit-db.com | Exploit, Third Party Advisory, VDB Entry |
| Time to Disable TP-Link Home WiFi Router (CVE-2018-11714) - SecureLayer7 | MISC | blog.securelayer7.net | Exploit, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.