Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-43318 PoC — TP-LINK JetStream Smart Switch TL-SG2210P 安全漏洞

Source
Associated Vulnerability
Title:TP-LINK JetStream Smart Switch TL-SG2210P 安全漏洞 (CVE-2023-43318)
Description:TP-LINK JetStream Smart Switch TL-SG2210P是中国普联(TP-LINK)公司的一款智能交换机。 TP-Link JetStream Smart Switch TL-SG2210P 5.0 Build 20211201版本存在安全漏洞,该漏洞源于允许攻击者通过修改GET请求中的tid和usrlvl值来提升权限。
Description
JetStream Smart Switch - TL-SG2210P v5.0/ Improper Access Control / CVE-2023-43318
Readme
# CVE-2023-43318

## JetStream Smart Switch - TL-SG2210P v5.0/ Improper Access Control / CVE-2023-43318

[+] Credits: Shahnawaz Shaikh, Security Researcher at Cybergate Defense LLC


[+] [Twitter](twitter.com/_striv3r_)


### Vendor:
Tp-Link (http://tp-link.com)


### Product:
JetStream Smart Switch - TL-SG2210P


### Vulnerability Type:
Incorrect Access Control (DOS)


### Affected Product Code Base:
JetStream Smart Switch - TL-SG2210P 5.0 Build 20211201


### Affected Component:
usermanagement, swtmactablecfg endpoints


### Security Issue:
TP-Link JetStream Smart Switch TL-SG2210P 5.0 Build 20211201 allows attackers to escalate privileges via modification of the 'tid' and 'usrlvl' values in GET requests.


### Attack Vectors:
A successful breach could grant improper admin controls, potentially compromising the system. Lower privilege users can access admin level endpoints via their own token ID.


### CVE Reference:
CVE-2023-43318


### Network Access:
Remote


### Severity:
High


### Disclosure Timeline: 
Vendor Notification: September 12, 2023
Vendor released fixed firmware TL-SG2210P(UN)_V5.20_5.20.1 Build 20240202: February 29, 2024
March 1, 2024 : Public Disclosure
File Snapshot

[4.0K] /data/pocs/9f315ec62b180279919d9d95e1730beb129d3315 └── [1.2K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.