CVE-2017-17746

Weak access control methods on the TP-Link TL-SG108E 1.0.0 allow any user on a NAT network with an authenticated administrator to access the device without entering user credentials. The authentication record is stored on the device; thus if an administrator authenticates from a NAT network, the authentication applies to the IP address of the NAT gateway, and any user behind that NAT gateway is also treated as authenticated.
References
Link Resource
http://seclists.org/fulldisclosure/2017/Dec/67 Exploit Mailing List Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tl-sg108e_firmware:1.0.0:*:*:*:*:*:*:*
OR cpe:2.3:h:tp-link:tl-sg108e:1.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-sg108e:2.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-sg108e:3.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-12-20 20:29

Updated : 2024-02-04 19:29


NVD link : CVE-2017-17746

Mitre link : CVE-2017-17746

CVE.ORG link : CVE-2017-17746


JSON object : View

Products Affected

tp-link

  • tl-sg108e_firmware
  • tl-sg108e
CWE
CWE-306

Missing Authentication for Critical Function