First published: Tue May 28 2024(Updated: )
An issue discovered in TP-LINK TL-R473GP-AC, TP-LINK XDR6020, TP-LINK TL-R479GP-AC, TP-LINK TL-R4239G, TP-LINK TL-WAR1200L, and TP-LINK TL-R476G routers allows attackers to hijack TCP sessions which could lead to a denial of service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link TL-R473GP-AC Firmware | ||
TP-LINK XDR6020 | ||
TP-Link TL-R479GP-AC Firmware | ||
TP-Link TL-R4239G Firmware | ||
TP-Link TL-WAR1200L Firmware | ||
TP-LINK TL-R476G |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30307 is considered a high-severity vulnerability due to its potential to allow TCP session hijacking.
To mitigate CVE-2023-30307, ensure that your affected TP-LINK router firmware is updated to the latest version provided by TP-LINK.
CVE-2023-30307 affects several TP-LINK products including TL-R473GP-AC, XDR6020, TL-R479GP-AC, TL-R4239G, TL-WAR1200L, and TL-R476G.
CVE-2023-30307 can be exploited to hijack TCP sessions, potentially leading to a denial of service.
While there is no specific information on active exploitation of CVE-2023-30307, its severity and nature make it a significant risk that should be addressed promptly.