ID

VAR-202101-0591


CVE

CVE-2020-35576


TITLE

TP-Link Made TL-WR841N V13 (JP) In OS Command injection vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2021-001010

DESCRIPTION

A Command Injection issue in the traceroute feature on TP-Link TL-WR841N V13 (JP) with firmware versions prior to 201216 allows authenticated users to execute arbitrary code as root via shell metacharacters, a different vulnerability than CVE-2018-12577. TP-Link Provides Wi-Fi Router TL-WR841N Hardware version V13 (JP) For firmware for OS Command injection vulnerabilities (CWE-78) Exists. TP-Link According to the hardware version V14 (JP) It is said that this vulnerability does not exist in the firmware for. This vulnerability information is available from Three Shake Co., Ltd. Koh You Liang He reports directly to the product developer, and after coordinating with the product developer, aims to inform the product user. JVN It was announced in.Of the product web The user who can log in to the interface is not expected due to the firmware design OS May execute the command. Tp-link TL-WR841N is a wireless router of Tp-link company in China. Attackers can use this vulnerability to execute arbitrary commands on the system

Trust: 2.25

sources: NVD: CVE-2020-35576 // JVNDB: JVNDB-2021-001010 // CNVD: CNVD-2021-20282 // VULMON: CVE-2020-35576

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-20282

AFFECTED PRODUCTS

vendor:tp linkmodel:tl-wr841nscope:ltversion:201216

Trust: 1.6

vendor:tp linkmodel:tl-wr841nscope:eqversion:v13 (jp) 向けファームウェア 201216

Trust: 0.8

sources: CNVD: CNVD-2021-20282 // JVNDB: JVNDB-2021-001010 // NVD: CVE-2020-35576

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2020-35576
value: HIGH

Trust: 1.0

IPA: JVNDB-2021-001010
value: HIGH

Trust: 0.8

CNVD: CNVD-2021-20282
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202101-2044
value: HIGH

Trust: 0.6

VULMON: CVE-2020-35576
value: HIGH

Trust: 0.1

NVD:
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

IPA: JVNDB-2021-001010
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:M/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2021-20282
severity: HIGH
baseScore: 8.0
vectorString: AV:N/AC:L/AU:S/C:P/I:C/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: COMPLETE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULMON: CVE-2020-35576
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

NVD:
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

IPA: JVNDB-2021-001010
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-20282 // VULMON: CVE-2020-35576 // JVNDB: JVNDB-2021-001010 // NVD: CVE-2020-35576 // CNNVD: CNNVD-202101-2044

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.8

sources: JVNDB: JVNDB-2021-001010 // NVD: CVE-2020-35576

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202101-2044

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-202101-2044

CONFIGURATIONS

sources: NVD: CVE-2020-35576

PATCH

title:Download TL-WR841N V13url:https://www.tp-link.com/jp/support/download/tl-wr841n/v13/

Trust: 0.8

title:ファームウェア バージョンの確認のしかたurl:https://www.tp-link.com/jp/support/faq/315/

Trust: 0.8

title:Patch for Tp-link TL-WR841N injection vulnerabilityurl:https://www.cnvd.org.cn/patchinfo/show/254146

Trust: 0.6

title:Tp-link TL-WR841N Repair measures for injecting vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqbyid.tag?id=140022

Trust: 0.6

title:TL_WR841Nurl:https://github.com/bussy1/tl_wr841n

Trust: 0.1

title: - url:https://github.com/live-hack-cve/cve-2020-35576

Trust: 0.1

title:Vulnerabilityurl:https://github.com/tzwlhack/vulnerability

Trust: 0.1

title: - url:https://github.com/kaychenvip/vulnerability-poc

Trust: 0.1

sources: CNVD: CNVD-2021-20282 // VULMON: CVE-2020-35576 // JVNDB: JVNDB-2021-001010 // CNNVD: CNNVD-202101-2044

EXTERNAL IDS

db:NVDid:CVE-2020-35576

Trust: 3.1

db:JVNid:JVNVU92444096

Trust: 2.5

db:JVNDBid:JVNDB-2021-001010

Trust: 2.0

db:CNVDid:CNVD-2021-20282

Trust: 0.6

db:CNNVDid:CNNVD-202101-2044

Trust: 0.6

db:VULMONid:CVE-2020-35576

Trust: 0.1

sources: CNVD: CNVD-2021-20282 // VULMON: CVE-2020-35576 // JVNDB: JVNDB-2021-001010 // NVD: CVE-2020-35576 // CNNVD: CNNVD-202101-2044

REFERENCES

url:https://jvn.jp/en/vu/jvnvu92444096/

Trust: 1.7

url:https://www.tp-link.com/us/security

Trust: 1.7

url:https://www.tp-link.com/jp/support/download/tl-wr841n/v13/#firmware

Trust: 1.7

url:https://jvndb.jvn.jp/en/contents/2021/jvndb-2021-001010.html

Trust: 1.2

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-35576

Trust: 0.8

url:http://jvn.jp/cert/jvnvu92444096

Trust: 0.8

url:https://isopach.dev/cve-2020-35576/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-35576

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:https://github.com/bussy1/tl_wr841n

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2021-20282 // VULMON: CVE-2020-35576 // JVNDB: JVNDB-2021-001010 // NVD: CVE-2020-35576 // CNNVD: CNNVD-202101-2044

SOURCES

db:CNVDid:CNVD-2021-20282
db:VULMONid:CVE-2020-35576
db:JVNDBid:JVNDB-2021-001010
db:NVDid:CVE-2020-35576
db:CNNVDid:CNNVD-202101-2044

LAST UPDATE DATE

2023-12-18T12:49:22.064000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-20282date:2021-03-23T00:00:00
db:VULMONid:CVE-2020-35576date:2023-02-02T00:00:00
db:JVNDBid:JVNDB-2021-001010date:2021-01-25T06:06:59
db:NVDid:CVE-2020-35576date:2023-02-02T19:58:07.720
db:CNNVDid:CNNVD-202101-2044date:2022-12-07T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-20282date:2021-03-21T00:00:00
db:VULMONid:CVE-2020-35576date:2021-01-26T00:00:00
db:JVNDBid:JVNDB-2021-001010date:2021-01-25T06:06:59
db:NVDid:CVE-2020-35576date:2021-01-26T18:15:54.223
db:CNNVDid:CNNVD-202101-2044date:2021-01-25T00:00:00