Weak access control methods on the TP-Link TL-SG108E 1.0.0 allow any user on a NAT network with an authenticated administrator to access the device without entering user credentials. The authentication record is stored on the device; thus if an administrator authenticates from a NAT network, the authentication applies to the IP address of the NAT gateway, and any user behind that NAT gateway is also treated as authenticated.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2017/Dec/67 | Exploit Mailing List Mitigation Third Party Advisory |
http://seclists.org/fulldisclosure/2017/Dec/67 | Exploit Mailing List Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2017/Dec/67 - Exploit, Mailing List, Mitigation, Third Party Advisory |
Information
Published : 2017-12-20 20:29
Updated : 2024-11-21 03:18
NVD link : CVE-2017-17746
Mitre link : CVE-2017-17746
CVE.ORG link : CVE-2017-17746
JSON object : View
Products Affected
tp-link
- tl-sg108e
- tl-sg108e_firmware
CWE
CWE-306
Missing Authentication for Critical Function