Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-10916

Опубликовано: 07 мая 2020
Источник: nvd
CVSS3: 8
CVSS3: 8
CVSS2: 5.2
EPSS Низкий

Описание

This vulnerability allows network-adjacent attackers to escalate privileges on affected installations of TP-Link TL-WA855RE Firmware Ver: 855rev4-up-ver1-0-1-P1[20191213-rel60361] Wi-Fi extenders. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the first-time setup process. The issue results from the lack of proper validation on first-time setup requests. An attacker can leverage this vulnerability to reset the password for the Admin account and execute code in the context of the device. Was ZDI-CAN-10003.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:o:tp-link:tl-wa855re_firmware:190408:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tl-wa855re_firmware:191213:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wa855re:v4:*:*:*:*:*:*:*

EPSS

Процентиль: 74%
0.0083
Низкий

8 High

CVSS3

8 High

CVSS3

5.2 Medium

CVSS2

Дефекты

CWE-287
CWE-287

Связанные уязвимости

github
больше 3 лет назад

This vulnerability allows network-adjacent attackers to escalate privileges on affected installations of TP-Link TL-WA855RE Firmware Ver: 855rev4-up-ver1-0-1-P1[20191213-rel60361] Wi-Fi extenders. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the first-time setup process. The issue results from the lack of proper validation on first-time setup requests. An attacker can leverage this vulnerability to reset the password for the Admin account and execute code in the context of the device. Was ZDI-CAN-10003.

EPSS

Процентиль: 74%
0.0083
Низкий

8 High

CVSS3

8 High

CVSS3

5.2 Medium

CVSS2

Дефекты

CWE-287
CWE-287