First published: Sat Dec 01 2018(Updated: )
An exploitable remote code execution vulnerability exists in the ping and tracert functionality of the TP-Link TL-R600VPN HWv3 FRNv1.3.0 and HWv2 FRNv1.2.3 http server. A specially crafted IP address can cause a stack overflow, resulting in remote code execution. An attacker can send a single authenticated HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-r600vpn Firmware | =1.3.0 | |
TP-Link TL-R600VPN | =3 | |
Tp-link Tl-r600vpn Firmware | =1.2.3 | |
TP-Link TL-R600VPN | =2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3950 is classified as a critical remote code execution vulnerability.
To fix CVE-2018-3950, update the firmware of the TP-Link TL-R600VPN to version 1.3.0 or higher.
An attacker can exploit CVE-2018-3950 to execute arbitrary code remotely on the affected device.
CVE-2018-3950 affects TP-Link TL-R600VPN devices running firmware versions 1.3.0 and 1.2.3.
The root cause of CVE-2018-3950 is a stack overflow in the ping and tracert functionality due to specially crafted IP addresses.