漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
TP-Link TL-SG108E HTTP GET Request usr_account_set.cgi get request method with sensitive query strings
Vulnerability Description
A vulnerability classified as problematic has been found in TP-Link TL-SG108E 1.0.0 Build 20201208 Rel. 40304. Affected is an unknown function of the file /usr_account_set.cgi of the component HTTP GET Request Handler. The manipulation of the argument username/password leads to use of get request method with sensitive query strings. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.0 Build 20250124 Rel. 54920(Beta) is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early. They reacted very professional and provided a pre-fix version for their customers.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Vulnerability Type
通过GET请求中的查询字符串导致的信息暴露
Vulnerability Title
TP-LINK TL-SG108E 安全漏洞
Vulnerability Description
TP-LINK TL-SG108E是中国普联(TP-LINK)公司的一个智能交换机。 TP-Link TL-SG108E 1.0.0 Build 20201208 Rel.40304版本存在安全漏洞,该漏洞源于文件/usr_account_set.cgi的参数username/password会导致使用带有敏感查询字符串的get请求方法。
CVSS Information
N/A
Vulnerability Type
N/A