Lucene search

K
nvd[email protected]NVD:CVE-2018-3949
HistoryDec 01, 2018 - 3:29 a.m.

CVE-2018-3949

2018-12-0103:29:00
CWE-22
web.nvd.nist.gov
3

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.3

Confidence

High

EPSS

0.033

Percentile

91.4%

An exploitable information disclosure vulnerability exists in the HTTP server functionality of the TP-Link TL-R600VPN. A specially crafted URL can cause a directory traversal, resulting in the disclosure of sensitive system files. An attacker can send either an unauthenticated or an authenticated web request to trigger this vulnerability.

Affected configurations

Nvd
Node
tp-linktl-r600vpn_firmwareMatch1.3.0
AND
tp-linktl-r600vpnMatch3
Node
tp-linktl-r600vpn_firmwareMatch1.2.3
AND
tp-linktl-r600vpnMatch2
VendorProductVersionCPE
tp-linktl-r600vpn_firmware1.3.0cpe:2.3:o:tp-link:tl-r600vpn_firmware:1.3.0:*:*:*:*:*:*:*
tp-linktl-r600vpn3cpe:2.3:h:tp-link:tl-r600vpn:3:*:*:*:*:*:*:*
tp-linktl-r600vpn_firmware1.2.3cpe:2.3:o:tp-link:tl-r600vpn_firmware:1.2.3:*:*:*:*:*:*:*
tp-linktl-r600vpn2cpe:2.3:h:tp-link:tl-r600vpn:2:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.3

Confidence

High

EPSS

0.033

Percentile

91.4%