An exploitable denial-of-service vulnerability exists in the URI-parsing functionality of the TP-Link TL-R600VPN HTTP server. A specially crafted URL can cause the server to stop responding to requests, resulting in downtime for the management portal. An attacker can send either an unauthenticated or authenticated web request to trigger this vulnerability.
                
            References
                    | Link | Resource | 
|---|---|
| https://talosintelligence.com/vulnerability_reports/TALOS-2018-0617 | Exploit Third Party Advisory | 
| https://talosintelligence.com/vulnerability_reports/TALOS-2018-0617 | Exploit Third Party Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2018-11-30 17:29
Updated : 2024-11-21 04:06
NVD link : CVE-2018-3948
Mitre link : CVE-2018-3948
CVE.ORG link : CVE-2018-3948
JSON object : View
Products Affected
                tp-link
- tl-r600vpn
- tl-r600vpn_firmware
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
