First published: Tue Aug 27 2019(Updated: )
TP-Link Archer C3200 V1 and Archer C2 V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. They forward ARP requests, which are sent as broadcast packets, between the host and the guest networks. To use this leakage as a direct covert channel, the sender can trivially issue an ARP request to an arbitrary computer on the network. (In general, some routers restrict ARP forwarding only to requests destined for the network's subnet mask, but these routers did not restrict this traffic in any way. Depending on this factor, one must use either the lower 8 bits of the IP address, or the entire 32 bits, as the data payload.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Archer C3200 V1 Firmware | ||
TP-Link Archer C3200 V1 | ||
Tp-link Archer C2 V1 Firmware | ||
Tp-link Archer C2 V1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this TP-Link Archer C3200 and Archer C2 vulnerability is CVE-2019-13268.
The severity level of CVE-2019-13268 is high.
The affected software for this vulnerability includes TP-Link Archer C3200 V1 Firmware and TP-Link Archer C2 V1 Firmware.
The CWE ID for this vulnerability is CWE-20.
TP-Link Archer C3200 V1 and Archer C2 V1 devices are not vulnerable to this vulnerability.