First published: Fri Nov 30 2018(Updated: )
An exploitable denial-of-service vulnerability exists in the URI-parsing functionality of the TP-Link TL-R600VPN HTTP server. A specially crafted URL can cause the server to stop responding to requests, resulting in downtime for the management portal. An attacker can send either an unauthenticated or authenticated web request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-r600vpn Firmware | =1.3.0 | |
TP-Link TL-R600VPN | =v3 | |
Tp-link Tl-r600vpn Firmware | =1.2.3 | |
TP-Link TL-R600VPN | =v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.