Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-3275

Опубликовано: 26 мар. 2021
Источник: nvd
CVSS3: 6.1
CVSS2: 4.3
EPSS Низкий

Описание

Unauthenticated stored cross-site scripting (XSS) exists in multiple TP-Link products including WIFI Routers (Wireless AC routers), Access Points, ADSL + DSL Gateways and Routers, which affects TD-W9977v1, TL-WA801NDv5, TL-WA801Nv6, TL-WA802Nv5, and Archer C3150v2 devices through the improper validation of the hostname. Some of the pages including dhcp.htm, networkMap.htm, dhcpClient.htm, qsEdit.htm, and qsReview.htm and use this vulnerable hostname function (setDefaultHostname()) without sanitization.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:tp-link:td-w9977_firmware:v1_0.1.0_0.9.1_up_boot\(161123\)_2016-11-23_15.36.15:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:td-w9977:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:tp-link:tl-wa801nd_firmware:v5_us_0.9.1_3.16_up_boot\[170905-rel56404\]:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wa801nd:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

cpe:2.3:o:tp-link:tl-wa801n_firmware:v6_eu_0.9.1_3.16_up_boot\[200116-rel61815\]:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wa801n:-:*:*:*:*:*:*:*
Конфигурация 4

Одновременно

cpe:2.3:o:tp-link:tl-wr802n_firmware:v4_us_0.9.1_3.17_up_boot\[200421-rel38950\]:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr802n:-:*:*:*:*:*:*:*
Конфигурация 5

Одновременно

cpe:2.3:o:tp-link:archer-c3150_firmware:v2_170926:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer-c3150:-:*:*:*:*:*:*:*

EPSS

Процентиль: 79%
0.01215
Низкий

6.1 Medium

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-79

Связанные уязвимости

github
больше 3 лет назад

Unauthenticated stored cross-site scripting (XSS) exists in multiple TP-Link products including WIFI Routers (Wireless AC routers), Access Points, ADSL + DSL Gateways and Routers, which affects TD-W9977v1, TL-WA801NDv5, TL-WA801Nv6, TL-WA802Nv5, and Archer C3150v2 devices through the improper validation of the hostname. Some of the pages including dhcp.htm, networkMap.htm, dhcpClient.htm, qsEdit.htm, and qsReview.htm and use this vulnerable hostname function (setDefaultHostname()) without sanitization.

EPSS

Процентиль: 79%
0.01215
Низкий

6.1 Medium

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-79