CVE-2021-3275
Published Mar 26, 2021
Last updated 4 years ago
Overview
- Description
- Unauthenticated stored cross-site scripting (XSS) exists in multiple TP-Link products including WIFI Routers (Wireless AC routers), Access Points, ADSL + DSL Gateways and Routers, which affects TD-W9977v1, TL-WA801NDv5, TL-WA801Nv6, TL-WA802Nv5, and Archer C3150v2 devices through the improper validation of the hostname. Some of the pages including dhcp.htm, networkMap.htm, dhcpClient.htm, qsEdit.htm, and qsReview.htm and use this vulnerable hostname function (setDefaultHostname()) without sanitization.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:td-w9977:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "91DDA5EB-0E7B-4700-946D-31EEF26B8D6F" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:tp-link:td-w9977_firmware:v1_0.1.0_0.9.1_up_boot\\(161123\\)_2016-11-23_15.36.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD66B72D-7C89-4FF6-91DC-9FB7B5FD3371" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:tl-wa801nd:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "39BD9D9A-2AB8-4A13-AB92-E13B82112281" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:tp-link:tl-wa801nd_firmware:v5_us_0.9.1_3.16_up_boot\\[170905-rel56404\\]:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2374306B-81BE-4F23-9DDD-68685BD4B223" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:tl-wa801n:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6D3CBF27-0233-4107-A8C3-B46A8FC8B610" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:tp-link:tl-wa801n_firmware:v6_eu_0.9.1_3.16_up_boot\\[200116-rel61815\\]:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66770164-F118-4C11-8E56-5C73C17046AD" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:tl-wr802n:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2E1B4F55-1FCF-4557-A051-2EBC1414DD00" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:tp-link:tl-wr802n_firmware:v4_us_0.9.1_3.17_up_boot\\[200421-rel38950\\]:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA6F74D4-3A51-4B1B-A769-5AF388DFF2FB" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:archer-c3150:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8AD35872-DC68-46CB-B8DE-FC71CCE157FC" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:tp-link:archer-c3150_firmware:v2_170926:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EB385F5-A6E7-4DA3-9E23-9E38E95406BE" } ], "operator": "OR" } ], "operator": "AND" } ]