Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
TP-Link Archer C3200 V1 and Archer C2 V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. A DHCP Request is sent to the router with a certain Transaction ID field. Following the DHCP protocol, the router responds with an ACK or NAK message. Studying the NAK case revealed that the router erroneously sends the NAK to both Host and Guest networks with the same Transaction ID as found in the DHCP Request. This allows encoding of data to be sent cross-router into the 32-bit Transaction ID field.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
TP-Link Archer C3200和Archer C2 输入验证错误漏洞
Vulnerability Description
TP-Link Archer C3200和Archer C2都是中国普联(TP-Link)公司的一款无线路由器。 TP-Link Archer C3200 V1版本和Archer C2 V1版本中存在安全漏洞,该漏洞源于程序没有充分隔离同一设备上的主人网络和访客网络。攻击者可通过发送特制的DHCP请求利用该漏洞在同一设备的两个隔离网段间传输数据。
CVSS Information
N/A
Vulnerability Type
N/A