First published: Tue Mar 05 2024(Updated: )
TP-Link JetStream Smart Switch TL-SG2210P 5.0 Build 20211201 allows attackers to escalate privileges via modification of the 'tid' and 'usrlvl' values in GET requests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Tp-link Tl-sg2210p Firmware | =5.0-build_20211201 | |
Tp-link Tl-sg2210p |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-43318 is considered a high severity vulnerability due to its potential for privilege escalation.
To fix CVE-2023-43318, update the TP-Link TL-SG2210P Smart Switch firmware to the latest version provided by TP-Link.
CVE-2023-43318 is associated with privilege escalation attacks through the manipulation of specific values in GET requests.
CVE-2023-43318 affects TP-Link JetStream Smart Switch TL-SG2210P running firmware version 5.0 Build 20211201.
To exploit CVE-2023-43318, an attacker would need to modify the 'tid' and 'usrlvl' values in GET requests.