VAR-201303-0450

Vulnerability from variot - Updated: 2022-10-19 22:38

The TP-LINK TL-WR740N is a wireless router device. A denial of service vulnerability exists in the TP-LINK TL-WR740N router. An attacker could exploit the vulnerability to cause the affected device to crash, resulting in a denial of service. TL-WR740N 3.16.4 Build 130205 Rel.63875n is vulnerable; other versions may also be affected. The TL-WR740N is a combined wired/wireless network connection device integrated with internet-sharing router and 4-port switch. The wireless N Router is 802.11b&g compatible based on 802.11n technology and gives you 802.11n performance up to 150Mbps at an even more affordable price. Bordering on 11n and surpassing 11g speed enables high bandwidth consuming applications like video streaming to be more fluid.The TP-Link WR740N Wireless N Router network device is exposed to a remote denial of service vulnerability when processing a HTTP request. This issue occurs when the web server (httpd) fails to handle a HTTP GET request over a given default TCP port 80. Sending a sequence of three dots (...) to the router will crash its httpd service denying the legitimate users access to the admin control panel management interface. To bring back the http srv and the admin UI, a user must physically reboot the router.Tested on: Router Webserver

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201303-0450",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "tl-wr740n",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "tp link",
        "version": "4.23"
      },
      {
        "model": "tp-link tl-wr",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "tplink",
        "version": "firmware version: 3.16.4 build 130205 rel.63875n (released: 2/5/2013)"
      },
      {
        "model": "tp-link tl-wr",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "tplink",
        "version": "hardware version: wr740n v4 00000000 (v4.23)"
      },
      {
        "model": "tp-link tl-wr",
        "scope": "eq",
        "trust": 0.1,
        "vendor": "tplink",
        "version": "model no. tl-wr740n / tl-wr740nd"
      }
    ],
    "sources": [
      {
        "db": "ZSL",
        "id": "ZSL-2013-5135"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02042"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Gjoko Krstic",
    "sources": [
      {
        "db": "BID",
        "id": "58623"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-457"
      }
    ],
    "trust": 0.9
  },
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2013-02042",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "CNVD",
            "id": "CNVD-2013-02042",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "ZSL",
            "id": "ZSL-2013-5135",
            "trust": 0.1,
            "value": "(2/5)"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZSL",
        "id": "ZSL-2013-5135"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02042"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The TP-LINK TL-WR740N is a wireless router device. A denial of service vulnerability exists in the TP-LINK TL-WR740N router. An attacker could exploit the vulnerability to cause the affected device to crash, resulting in a denial of service. \nTL-WR740N 3.16.4 Build 130205 Rel.63875n is vulnerable; other versions may also be affected. The TL-WR740N is a combined wired/wireless network connection device integrated with internet-sharing router and 4-port switch. The wireless N Router is 802.11b\u0026amp;g compatible based on 802.11n technology and gives you 802.11n performance up to 150Mbps at an even more affordable price. Bordering on 11n and surpassing 11g speed enables high bandwidth consuming applications like video streaming to be more fluid.The TP-Link WR740N Wireless N Router network device is exposed to a remote denial of service vulnerability when processing a HTTP request. This issue occurs when the web server (httpd) fails to handle a HTTP GET request over a given default TCP port 80. Sending a sequence of three dots (...) to the router will crash its httpd service denying the legitimate users access to the admin control panel management interface. To bring back the http srv and the admin UI, a user must physically reboot the router.Tested on: Router Webserver",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-02042"
      },
      {
        "db": "BID",
        "id": "58623"
      },
      {
        "db": "ZSL",
        "id": "ZSL-2013-5135"
      }
    ],
    "trust": 0.9
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "http://www.tp-link.us/support/download/?model=tl-wr740n\u0026version=v4#tbl_j",
        "trust": 0.1,
        "type": "poc"
      }
    ],
    "sources": [
      {
        "db": "ZSL",
        "id": "ZSL-2013-5135"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "58623",
        "trust": 1.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02042",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-457",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "24866",
        "trust": 0.1
      },
      {
        "db": "XF",
        "id": "82995",
        "trust": 0.1
      },
      {
        "db": "VULDB",
        "id": "8076",
        "trust": 0.1
      },
      {
        "db": "SECUNIA",
        "id": "52713",
        "trust": 0.1
      },
      {
        "db": "OSVDB",
        "id": "91581",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "120893",
        "trust": 0.1
      },
      {
        "db": "CXSECURITY",
        "id": "WLB-2013030181",
        "trust": 0.1
      },
      {
        "db": "ZSL",
        "id": "ZSL-2013-5135",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "ZSL",
        "id": "ZSL-2013-5135"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02042"
      },
      {
        "db": "BID",
        "id": "58623"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-457"
      }
    ]
  },
  "id": "VAR-201303-0450",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-02042"
      }
    ],
    "trust": 1.2956522000000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-02042"
      }
    ]
  },
  "last_update_date": "2022-10-19T22:38:17.593000Z",
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.3,
        "url": "http://www.securityfocus.com/bid/58623"
      },
      {
        "trust": 0.1,
        "url": "http://packetstormsecurity.com/files/120893"
      },
      {
        "trust": 0.1,
        "url": "http://cxsecurity.com/issue/wlb-2013030181"
      },
      {
        "trust": 0.1,
        "url": "http://www.exploit-db.com/exploits/24866/"
      },
      {
        "trust": 0.1,
        "url": "http://1337day.com/exploit/20540"
      },
      {
        "trust": 0.1,
        "url": "http://www.osvdb.org/show/osvdb/91581"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/52713/"
      },
      {
        "trust": 0.1,
        "url": "http://xforce.iss.net/xforce/xfdb/82995"
      },
      {
        "trust": 0.1,
        "url": "http://www.tp-link.us/support/download/?model=tl-wr740n\u0026amp;version=v4"
      },
      {
        "trust": 0.1,
        "url": "http://www.scip.ch/en/?vuldb.8076"
      }
    ],
    "sources": [
      {
        "db": "ZSL",
        "id": "ZSL-2013-5135"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02042"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-457"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "ZSL",
        "id": "ZSL-2013-5135"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-02042"
      },
      {
        "db": "BID",
        "id": "58623"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-457"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-03-21T00:00:00",
        "db": "ZSL",
        "id": "ZSL-2013-5135"
      },
      {
        "date": "2013-03-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-02042"
      },
      {
        "date": "2013-03-21T00:00:00",
        "db": "BID",
        "id": "58623"
      },
      {
        "date": "2013-03-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201303-457"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-05-27T00:00:00",
        "db": "ZSL",
        "id": "ZSL-2013-5135"
      },
      {
        "date": "2013-03-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-02042"
      },
      {
        "date": "2013-03-21T00:00:00",
        "db": "BID",
        "id": "58623"
      },
      {
        "date": "2013-03-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201303-457"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-457"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "TP-LINK TL-WR740N Router Denial of Service Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-02042"
      },
      {
        "db": "BID",
        "id": "58623"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201303-457"
      }
    ],
    "trust": 1.5
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "58623"
      }
    ],
    "trust": 0.3
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…