First published: Tue Aug 27 2019(Updated: )
TP-Link Archer C3200 V1 and Archer C2 V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. In order to transfer data from the host network to the guest network, the sender joins and then leaves an IGMP group. After it leaves, the router (following the IGMP protocol) creates an IGMP Membership Query packet with the Group IP and sends it to both the Host and the Guest networks. The data is transferred within the Group IP field, which is completely controlled by the sender.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Archer C3200 V1 Firmware | ||
TP-Link Archer C3200 V1 | ||
Tp-link Archer C2 V1 Firmware | ||
Tp-link Archer C2 V1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13267 is a vulnerability found in TP-Link Archer C3200 V1 and Archer C2 V1 devices that allows insufficient compartmentalization between a host network and a guest network.
CVE-2019-13267 exploits the lack of compartmentalization by allowing data transfer from the host network to the guest network by joining and leaving an IGMP group.
CVE-2019-13267 has a severity rating of 8.8 (high).
TP-Link Archer C3200 V1 and Archer C2 V1 devices are affected by CVE-2019-13267.
To fix CVE-2019-13267, it is recommended to update the firmware of the TP-Link Archer C3200 V1 and Archer C2 V1 devices to the latest version provided by TP-Link.