Vulnerability Description
TP-Link JetStream Smart Switch TL-SG2210P 5.0 Build 20211201 allows attackers to escalate privileges via modification of the 'tid' and 'usrlvl' values in GET requests.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Tl-Sg2210P Firmware | 5.0 |
| Tp-Link | Tl-Sg2210P | - |
Related Weaknesses (CWE)
References
- https://github.com/str2ver/CVE-2023-43318/tree/mainThird Party Advisory
- https://seclists.org/fulldisclosure/2024/Mar/9Mailing ListThird Party Advisory
- https://seclists.org/fulldisclosure/2024/Mar/9Mailing ListThird Party Advisory
- https://seclists.org/fulldisclosure/2024/Mar/9Mailing ListThird Party Advisory
- https://seclists.org/fulldisclosure/2024/Mar/9Mailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2024/Mar/9
- https://github.com/str2ver/CVE-2023-43318/tree/mainThird Party Advisory
- https://seclists.org/fulldisclosure/2024/Mar/9Mailing ListThird Party Advisory
- https://seclists.org/fulldisclosure/2024/Mar/9Mailing ListThird Party Advisory
- https://seclists.org/fulldisclosure/2024/Mar/9Mailing ListThird Party Advisory
- https://seclists.org/fulldisclosure/2024/Mar/9Mailing ListThird Party Advisory
FAQ
What is CVE-2023-43318?
CVE-2023-43318 is a vulnerability with a CVSS score of 8.8 (HIGH). TP-Link JetStream Smart Switch TL-SG2210P 5.0 Build 20211201 allows attackers to escalate privileges via modification of the 'tid' and 'usrlvl' values in GET requests.
How severe is CVE-2023-43318?
CVE-2023-43318 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-43318?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Tl-Sg2210P Firmware, Tp-Link Tl-Sg2210P.