CVE-2021-31659
Published Jun 10, 2021
Last updated 3 years ago
Overview
- Description
- TP-Link TL-SG2005, TL-SG2008, etc. 1.0.0 Build 20180529 Rel.40524 is vulnerable to Cross Site Request Forgery (CSRF). All configuration information is placed in the URL, without any additional token authentication information. A malicious link opened by the switch administrator may cause the password of the switch to be modified and the configuration file to be tampered with.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-352
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:tp-link:tl-sg2005_firmware:1.0.0:build_20180529_rel.40524:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8150744-4213-428D-8411-F3A506FBE20D" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:tl-sg2005:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "73489BCA-57B8-4418-A61A-BF4599F575D8" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:tp-link:tl-sg2008_firmware:1.0.0:build_20180529_rel.40524:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77DD8C98-211B-4E6B-AFAE-1D49D7EA8574" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:tl-sg2008:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7B0AC813-1BE8-48D0-AD7C-AA443FB307E6" } ], "operator": "OR" } ], "operator": "AND" } ]