First published: Fri Nov 30 2018(Updated: )
An exploitable denial-of-service vulnerability exists in the URI-parsing functionality of the TP-Link TL-R600VPN HTTP server. A specially crafted URL can cause the server to stop responding to requests, resulting in downtime for the management portal. An attacker can send either an unauthenticated or authenticated web request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link TL-R600VPN Firmware | =1.3.0 | |
TP-Link TL-R600VPN Firmware | =v3 | |
TP-Link TL-R600VPN Firmware | =1.2.3 | |
TP-Link TL-R600VPN Firmware | =v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3948 is classified as a denial-of-service vulnerability that can cause significant downtime.
To mitigate CVE-2018-3948, it is recommended to upgrade your TP-Link TL-R600VPN firmware to the latest version that addresses this vulnerability.
CVE-2018-3948 affects TP-Link TL-R600VPN firmware versions 1.2.3 and 1.3.0.
Yes, CVE-2018-3948 can be exploited remotely by sending specially crafted URLs to the affected HTTP server.
The impact of CVE-2018-3948 includes the HTTP server becoming unresponsive, which may hinder access to the management portal.