First published: Mon Oct 01 2018(Updated: )
The web interface in TP-Link TL-WRN841N 0.9.1 4.16 v0348.0 is vulnerable to a denial of service when an unauthenticated LAN user sends a crafted HTTP header containing an unexpected Cookie field.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link TL-WR841ND V7 | =0.9.1_4.16_v0348.0 | |
TP-Link TL-WRN841N Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15701 has a medium severity rating associated with the potential for denial of service.
To fix CVE-2018-15701, upgrade the firmware of TP-Link TL-WRN841N to the latest version.
CVE-2018-15701 affects the TP-Link TL-WRN841N running firmware version 0.9.1_4.16_v0348.0.
CVE-2018-15701 is a denial of service vulnerability that can be triggered by an unauthenticated LAN user.
No, CVE-2018-15701 requires an unauthenticated user on the local network to exploit the vulnerability.