First published: Sat Dec 01 2018(Updated: )
An exploitable remote code execution vulnerability exists in the HTTP header-parsing function of the TP-Link TL-R600VPN HTTP Server. A specially crafted HTTP request can cause a buffer overflow, resulting in remote code execution on the device. An attacker can send an authenticated HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-r600vpn Firmware | ||
TP-Link TL-R600VPN |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-3951 is critical, as it allows remote code execution on the affected TP-Link TL-R600VPN device.
To fix CVE-2018-3951, update the TP-Link TL-R600VPN firmware to the latest version provided by the manufacturer.
CVE-2018-3951 affects TP-Link TL-R600VPN devices running vulnerable firmware versions.
An attacker can exploit CVE-2018-3951 by sending a specially crafted HTTP request to cause a buffer overflow.
Yes, exploitation of CVE-2018-3951 requires an authenticated HTTP request to the device.