First published: Tue Oct 01 2013(Updated: )
The TP-Link IP Cameras TL-SC3171, TL-SC3130, TL-SC3130G, TL-SC3171G, and possibly other models before beta firmware LM.1.6.18P12_sign6, does not properly restrict access to certain administrative functions, which allows remote attackers to (1) cause a denial of service (device reboot) via a request to cgi-bin/reboot or (2) cause a denial of service (reboot and reset to factory defaults) via a request to cgi-bin/hardfactorydefault.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link TL-SC3130G | ||
TP-Link TL-SC3130G Firmware | ||
TP-Link TL-SC3171G | ||
Tp-link TL-SC 3171G Firmware | ||
TP-Link LM Firmware | <=1.6.18p12_sign5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3688 has a high severity rating due to its ability to allow remote attackers to disrupt device functionality.
To address CVE-2013-3688, update to the beta firmware version LM.1.6.18P12_sign6 or later for affected TP-Link camera models.
CVE-2013-3688 affects TP-Link IP Cameras TL-SC3171, TL-SC3130, TL-SC3130G, TL-SC3171G, and potentially others with prior firmware versions.
CVE-2013-3688 can be exploited by remote attackers to perform a denial of service attack, causing the device to reboot.
There is no official workaround for CVE-2013-3688; the recommended solution is to update the firmware to the fixed version.