First published: Mon Jun 04 2018(Updated: )
An issue was discovered on TP-Link TL-WR840N v5 00000005 0.9.1 3.16 v0001.0 Build 170608 Rel.58696n and TL-WR841N v13 00000013 0.9.1 4.16 v0001.0 Build 170622 Rel.64334n devices. This issue is caused by improper session handling on the /cgi/ folder or a /cgi file. If an attacker sends a header of "Referer: http://192.168.0.1/mainFrame.htm" then no authentication is required for any action.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr840n Firmware | =0.9.1_3.16 | |
TP-LINK TL-WR840N | =5.0 | |
Tp-link Tl-wr841n Firmware | =0.9.1_4.16 | |
TP-LINK TL-WR841N | =13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11714 is a vulnerability discovered on TP-Link TL-WR840N v5 and TL-WR841N v13 devices.
CVE-2018-11714 has a severity rating of 9.8 (critical).
CVE-2018-11714 allows attackers to exploit improper session handling on the /cgi/ folder or a /cgi file on TP-Link TL-WR840N v5 and TL-WR841N v13 devices.
To fix CVE-2018-11714, it is recommended to disable the affected TP-Link devices or apply any available firmware updates provided by the manufacturer.
You can find more information about CVE-2018-11714 in the following sources: [Reference 1](http://blog.securelayer7.net/time-to-disable-tp-link-home-wifi-router/) and [Reference 2](https://www.exploit-db.com/exploits/44781/).