Vulnerability Description
An exploitable remote code execution vulnerability exists in the HTTP header-parsing function of the TP-Link TL-R600VPN HTTP Server. A specially crafted HTTP request can cause a buffer overflow, resulting in remote code execution on the device. An attacker can send an authenticated HTTP request to trigger this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Tl-R600Vpn Firmware | All versions |
| Tp-Link | Tl-R600Vpn | - |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2018-0620ExploitThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2018-0620ExploitThird Party Advisory
FAQ
What is CVE-2018-3951?
CVE-2018-3951 is a vulnerability with a CVSS score of 7.2 (HIGH). An exploitable remote code execution vulnerability exists in the HTTP header-parsing function of the TP-Link TL-R600VPN HTTP Server. A specially crafted HTTP request can cause a buffer overflow, resul...
How severe is CVE-2018-3951?
CVE-2018-3951 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-3951?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Tl-R600Vpn Firmware, Tp-Link Tl-R600Vpn.