Vulnerability Description
Weak access control methods on the TP-Link TL-SG108E 1.0.0 allow any user on a NAT network with an authenticated administrator to access the device without entering user credentials. The authentication record is stored on the device; thus if an administrator authenticates from a NAT network, the authentication applies to the IP address of the NAT gateway, and any user behind that NAT gateway is also treated as authenticated.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Tl-Sg108E Firmware | 1.0.0 |
| Tp-Link | Tl-Sg108E | 1.0 |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2017/Dec/67ExploitMailing ListMitigation
- http://seclists.org/fulldisclosure/2017/Dec/67ExploitMailing ListMitigation
FAQ
What is CVE-2017-17746?
CVE-2017-17746 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Weak access control methods on the TP-Link TL-SG108E 1.0.0 allow any user on a NAT network with an authenticated administrator to access the device without entering user credentials. The authenticatio...
How severe is CVE-2017-17746?
CVE-2017-17746 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-17746?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Tl-Sg108E Firmware, Tp-Link Tl-Sg108E.