CVE-2020-35575

A password-disclosure issue in the web interface on certain TP-Link devices allows a remote attacker to get full administrative access to the web panel. This affects WA901ND devices before 3.16.9(201211) beta, and Archer C5, Archer C7, MR3420, MR6400, WA701ND, WA801ND, WDR3500, WDR3600, WE843N, WR1043ND, WR1045ND, WR740N, WR741ND, WR749N, WR802N, WR840N, WR841HP, WR841N, WR842N, WR842ND, WR845N, WR940N, WR941HP, WR945N, WR949N, and WRD4300 devices.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:wa901nd_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wa901nd:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:tp-link:archer_c5_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_c5:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:tp-link:archer_c7_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_c7:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:tp-link:mr3420_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:mr3420:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:tp-link:mr6400_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:mr6400:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:tp-link:wa701nd_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wa701nd:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:tp-link:wa801nd_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wa801nd:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:tp-link:wdr3500_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wdr3500:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:tp-link:wdr3600_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wdr3600:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:tp-link:we843n_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:we843n:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:tp-link:wr1043nd_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr1043nd:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:tp-link:wr1045nd_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr1045nd:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:tp-link:wr740n_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr740n:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:tp-link:wr741nd_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr741nd:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:tp-link:wr749n_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr749n:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:tp-link:wr802n_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr802n:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:tp-link:wr840n_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr840n:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:tp-link:wr841hp_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr841hp:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:tp-link:wr841n_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr841n:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
cpe:2.3:o:tp-link:wr842n_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr842n:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
cpe:2.3:o:tp-link:wr842nd_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr842nd:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
cpe:2.3:o:tp-link:wr845n_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr845n:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
cpe:2.3:o:tp-link:wr940n_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr940n:-:*:*:*:*:*:*:*

Configuration 24 (hide)

AND
cpe:2.3:o:tp-link:wr941hp_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr941hp:-:*:*:*:*:*:*:*

Configuration 25 (hide)

AND
cpe:2.3:o:tp-link:wr945n_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr945n:-:*:*:*:*:*:*:*

Configuration 26 (hide)

AND
cpe:2.3:o:tp-link:wr949n_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr949n:-:*:*:*:*:*:*:*

Configuration 27 (hide)

AND
cpe:2.3:o:tp-link:wrd4300_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wrd4300:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:27

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/163274/TP-Link-TL-WR841N-Command-Injection.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/163274/TP-Link-TL-WR841N-Command-Injection.html - Exploit, Third Party Advisory, VDB Entry
References () https://pastebin.com/F8AuUdck - Third Party Advisory () https://pastebin.com/F8AuUdck - Third Party Advisory
References () https://static.tp-link.com/2020/202012/20201214/wa901ndv5_eu_3_16_9_up_boot%28201211%29.zip - () https://static.tp-link.com/2020/202012/20201214/wa901ndv5_eu_3_16_9_up_boot%28201211%29.zip -
References () https://www.tp-link.com/us/security - Vendor Advisory () https://www.tp-link.com/us/security - Vendor Advisory

07 Nov 2023, 03:21

Type Values Removed Values Added
References
  • {'url': 'https://static.tp-link.com/2020/202012/20201214/wa901ndv5_eu_3_16_9_up_boot(201211).zip', 'name': 'https://static.tp-link.com/2020/202012/20201214/wa901ndv5_eu_3_16_9_up_boot(201211).zip', 'tags': ['Vendor Advisory'], 'refsource': 'MISC'}
  • () https://static.tp-link.com/2020/202012/20201214/wa901ndv5_eu_3_16_9_up_boot%28201211%29.zip -

Information

Published : 2020-12-26 02:15

Updated : 2024-11-21 05:27


NVD link : CVE-2020-35575

Mitre link : CVE-2020-35575

CVE.ORG link : CVE-2020-35575


JSON object : View

Products Affected

tp-link

  • wa701nd
  • wr845n_firmware
  • mr3420_firmware
  • wr949n
  • wr842n
  • wrd4300
  • wr941hp_firmware
  • wr841n
  • wr842n_firmware
  • wr740n
  • we843n_firmware
  • wdr3600
  • wr749n
  • wr842nd_firmware
  • wr945n
  • wr940n
  • mr6400
  • wr1045nd
  • wa801nd_firmware
  • wr741nd
  • wr802n
  • mr3420
  • wr1043nd
  • wr740n_firmware
  • mr6400_firmware
  • wa901nd_firmware
  • wdr3500_firmware
  • wr741nd_firmware
  • wr940n_firmware
  • wr845n
  • wrd4300_firmware
  • wa801nd
  • wr841hp
  • we843n
  • wr841n_firmware
  • archer_c7
  • wr945n_firmware
  • archer_c5_firmware
  • wr1043nd_firmware
  • wdr3500
  • wr840n
  • archer_c5
  • wr841hp_firmware
  • wr949n_firmware
  • wa901nd
  • wdr3600_firmware
  • wa701nd_firmware
  • wr749n_firmware
  • wr802n_firmware
  • archer_c7_firmware
  • wr842nd
  • wr840n_firmware
  • wr1045nd_firmware
  • wr941hp