First published: Fri Mar 26 2021(Updated: )
Unauthenticated stored cross-site scripting (XSS) exists in multiple TP-Link products including WIFI Routers (Wireless AC routers), Access Points, ADSL + DSL Gateways and Routers, which affects TD-W9977v1, TL-WA801NDv5, TL-WA801Nv6, TL-WA802Nv5, and Archer C3150v2 devices through the improper validation of the hostname. Some of the pages including dhcp.htm, networkMap.htm, dhcpClient.htm, qsEdit.htm, and qsReview.htm and use this vulnerable hostname function (setDefaultHostname()) without sanitization.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Td-w9977 Firmware | =v1_0.1.0_0.9.1_up_boot\(161123\)_2016-11-23_15.36.15 | |
Tp-link Td-w9977 | ||
Tp-link Tl-wa801nd Firmware | =v5_us_0.9.1_3.16_up_boot\[170905-rel56404\] | |
Tp-link Tl-wa801nd | ||
Tp-link Tl-wa801n Firmware | =v6_eu_0.9.1_3.16_up_boot\[200116-rel61815\] | |
TP-LINK TL-WA801N | ||
Tp-link Tl-wr802n Firmware | =v4_us_0.9.1_3.17_up_boot\[200421-rel38950\] | |
TP-Link TL-WR802N | ||
Tp-link Archer-c3150 Firmware | =v2_170926 | |
Tp-link Archer-c3150 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3275 is an unauthenticated stored cross-site scripting (XSS) vulnerability that exists in multiple TP-Link products.
CVE-2021-3275 affects TP-Link WIFI Routers (Wireless AC routers), Access Points, ADSL + DSL Gateways and Routers, including TD-W9977v1, TL-WA801NDv5, TL-WA801Nv6, TL-WA802Nv5, and Archer C3150v2 devices.
CVE-2021-3275 has a severity rating of 6.1, which is considered medium.
CVE-2021-3275 allows for unauthenticated stored cross-site scripting (XSS) attacks on affected TP-Link products.
Yes, you can find more information about CVE-2021-3275 at the following references: [1] [2] [3]