Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
TP-Link TL-SG108E HTTP GET Request usr_account_set.cgi get request method with sensitive query strings
Vulnerability Description
A vulnerability classified as problematic has been found in TP-Link TL-SG108E 1.0.0 Build 20201208 Rel. 40304. Affected is an unknown function of the file /usr_account_set.cgi of the component HTTP GET Request Handler. The manipulation of the argument username/password leads to use of get request method with sensitive query strings. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.0 Build 20250124 Rel. 54920(Beta) is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early. They reacted very professional and provided a pre-fix version for their customers.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Vulnerability Type
通过GET请求中的查询字符串导致的信息暴露
Vulnerability Title
TP-LINK TL-SG108E 安全漏洞
Vulnerability Description
TP-LINK TL-SG108E是中国普联(TP-LINK)公司的一个智能交换机。 TP-Link TL-SG108E 1.0.0 Build 20201208 Rel.40304版本存在安全漏洞,该漏洞源于文件/usr_account_set.cgi的参数username/password会导致使用带有敏感查询字符串的get请求方法。
CVSS Information
N/A
Vulnerability Type
N/A