First published: Sat Dec 01 2018(Updated: )
An exploitable information disclosure vulnerability exists in the HTTP server functionality of the TP-Link TL-R600VPN. A specially crafted URL can cause a directory traversal, resulting in the disclosure of sensitive system files. An attacker can send either an unauthenticated or an authenticated web request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-r600vpn Firmware | =1.3.0 | |
TP-Link TL-R600VPN | =3 | |
Tp-link Tl-r600vpn Firmware | =1.2.3 | |
TP-Link TL-R600VPN | =2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3949 is classified as a medium severity vulnerability due to the potential information disclosure risks.
To fix CVE-2018-3949, update the TP-Link TL-R600VPN firmware to version 1.3.1 or later.
CVE-2018-3949 is a directory traversal vulnerability that allows sensitive file disclosure.
CVE-2018-3949 affects the TP-Link TL-R600VPN running firmware versions 1.2.3 and 1.3.0.
Yes, CVE-2018-3949 can be exploited remotely by an attacker through a specially crafted URL.