Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2015-3035 First vendor Publication 2015-04-21
Vendor Cve Last vendor Modification 2018-10-09

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:N/A:N)
Cvss Base Score 7.8 Attack Range Network
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Directory traversal vulnerability in TP-LINK Archer C5 (1.2) with firmware before 150317, C7 (2.0) with firmware before 150304, and C8 (1.0) with firmware before 150316, Archer C9 (1.0), TL-WDR3500 (1.0), TL-WDR3600 (1.0), and TL-WDR4300 (1.0) with firmware before 150302, TL-WR740N (5.0) and TL-WR741ND (5.0) with firmware before 150312, and TL-WR841N (9.0), TL-WR841N (10.0), TL-WR841ND (9.0), and TL-WR841ND (10.0) with firmware before 150310 allows remote attackers to read arbitrary files via a .. (dot dot) in the PATH_INFO to login/.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3035

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Hardware 1
Os 1
Os 1
Os 1

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/74050
BUGTRAQ http://www.securityfocus.com/archive/1/535240/100/0/threaded
CONFIRM http://www.tp-link.com/en/download/Archer-C5_V1.20.html#Firmware
http://www.tp-link.com/en/download/Archer-C7_V2.html#Firmware
http://www.tp-link.com/en/download/Archer-C8_V1.html#Firmware
http://www.tp-link.com/en/download/Archer-C9_V1.html#Firmware
http://www.tp-link.com/en/download/TL-WDR3500_V1.html#Firmware
http://www.tp-link.com/en/download/TL-WDR3600_V1.html#Firmware
http://www.tp-link.com/en/download/TL-WDR4300_V1.html#Firmware
http://www.tp-link.com/en/download/TL-WR740N_V5.html#Firmware
http://www.tp-link.com/en/download/TL-WR741ND_V5.html#Firmware
http://www.tp-link.com/en/download/TL-WR841N_V9.html#Firmware
http://www.tp-link.com/en/download/TL-WR841ND_V9.html#Firmware
FULLDISC http://seclists.org/fulldisclosure/2015/Apr/26
MISC http://packetstormsecurity.com/files/131378/TP-LINK-Local-File-Disclosure.html
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/201504...

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2020-05-23 00:44:58
  • Multiple Updates
2018-10-10 00:19:55
  • Multiple Updates
2016-12-03 09:24:11
  • Multiple Updates
2016-06-29 00:55:42
  • Multiple Updates
2016-04-27 02:18:10
  • Multiple Updates
2015-07-07 21:27:21
  • Multiple Updates
2015-04-27 17:26:17
  • Multiple Updates
2015-04-24 00:28:06
  • Multiple Updates
2015-04-23 09:28:47
  • Multiple Updates
2015-04-22 09:28:54
  • First insertion