{"uuid": "7b33590a-a84e-4729-81e7-b6c32362988b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2015-3035", "type": "seen", "source": "https://t.me/arpsyndicate/1214", "content": "#ExploitObserverAlert\n\nCVE-2015-3035\n\nDESCRIPTION: Exploit Observer has 21 entries related to CVE-2015-3035. Directory traversal vulnerability in TP-LINK Archer C5 (1.2) with firmware before 150317, C7 (2.0) with firmware before 150304, and C8 (1.0) with firmware before 150316, Archer C9 (1.0), TL-WDR3500 (1.0), TL-WDR3600 (1.0), and TL-WDR4300 (1.0) with firmware before 150302, TL-WR740N (5.0) and TL-WR741ND (5.0) with firmware before 150312, and TL-WR841N (9.0), TL-WR841N (10.0), TL-WR841ND (9.0), and TL-WR841ND (10.0) with firmware before 150310 allows remote attackers to read arbitrary files via a .. (dot dot) in the PATH_INFO to login/.\n\nFIRST-EPSS: 0.589930000\nNVD-IS: 6.9\nNVD-ES: 10.0", "creation_timestamp": "2023-12-04T13:14:49.000000Z"}