First published: Mon May 04 2020(Updated: )
TP-Link Omada Controller Software 3.2.6 allows Directory Traversal for reading arbitrary files via com.tp_link.eap.web.portal.PortalController.getAdvertiseFile in /opt/tplink/EAPController/lib/eap-web-3.2.6.jar.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Omada Controller | =3.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID of this vulnerability is CVE-2020-12475.
The severity level of CVE-2020-12475 is medium with a CVSS score of 5.5.
CVE-2020-12475 allows Directory Traversal for reading arbitrary files in TP-Link Omada Controller Software 3.2.6.
An attacker can exploit CVE-2020-12475 by sending a specially crafted request to the vulnerable TP-Link Omada Controller software, allowing them to read arbitrary files.
Yes, TP-Link has released a patch to fix CVE-2020-12475. It is recommended to update to the latest version of the Omada Controller software.