CVE-2025-0730

A vulnerability classified as problematic has been found in TP-Link TL-SG108E 1.0.0 Build 20201208 Rel. 40304. Affected is an unknown function of the file /usr_account_set.cgi of the component HTTP GET Request Handler. The manipulation of the argument username/password leads to use of get request method with sensitive query strings. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.0 Build 20250124 Rel. 54920(Beta) is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early. They reacted very professional and provided a pre-fix version for their customers.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tl-sg108e_firmware:1.0.0:build_20201208_rel_40304:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-sg108e:-:*:*:*:*:*:*:*

History

16 Jul 2025, 00:57

Type Values Removed Values Added
References () https://github.com/TheCyberDiver/Public-Disclosures-CVE-/blob/main/tp-link%20sensitive%20info%20in%20GET.md - () https://github.com/TheCyberDiver/Public-Disclosures-CVE-/blob/main/tp-link%20sensitive%20info%20in%20GET.md - Exploit, Third Party Advisory
References () https://static.tp-link.com/upload/beta/2025/202501/20250124/TL-SG108E(UN)%206.0_1.0.0%20Build%2020250124%20Rel.54920(Beta)_up.zip - () https://static.tp-link.com/upload/beta/2025/202501/20250124/TL-SG108E(UN)%206.0_1.0.0%20Build%2020250124%20Rel.54920(Beta)_up.zip - Broken Link
References () https://vuldb.com/?ctiid.293508 - () https://vuldb.com/?ctiid.293508 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.293508 - () https://vuldb.com/?id.293508 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.478465 - () https://vuldb.com/?submit.478465 - Third Party Advisory, VDB Entry
References () https://www.tp-link.com/ - () https://www.tp-link.com/ - Product
First Time Tp-link tl-sg108e Firmware
Tp-link
Tp-link tl-sg108e
Summary
  • (es) Se ha encontrado una vulnerabilidad clasificada como problemática en TP-Link TL-SG108E 1.0.0 Build 20201208 Rel. 40304. Se ve afectada una función desconocida del archivo /usr_account_set.cgi del componente HTTP GET Request Handler. La manipulación del argumento nombre de usuario/contraseña conduce al uso del método de solicitud GET con cadenas de consulta sensibles. Es posible lanzar el ataque de forma remota. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es difícil. El exploit se ha revelado al público y puede usarse. La actualización a la versión 1.0.0 Build 20250124 Rel. 54920 (Beta) puede solucionar este problema. Se recomienda actualizar el componente afectado. Se contactó al proveedor con prontitud. Reaccionaron de manera muy profesional y proporcionaron una versión previa a la corrección para sus clientes.
CPE cpe:2.3:h:tp-link:tl-sg108e:-:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tl-sg108e_firmware:1.0.0:build_20201208_rel_40304:*:*:*:*:*:*

27 Jan 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-27 17:15

Updated : 2025-07-16 00:57


NVD link : CVE-2025-0730

Mitre link : CVE-2025-0730

CVE.ORG link : CVE-2025-0730


JSON object : View

Products Affected

tp-link

  • tl-sg108e
  • tl-sg108e_firmware
CWE
CWE-598

Use of GET Request Method With Sensitive Query Strings