CVE-2023-43318

TP-Link JetStream Smart Switch TL-SG2210P 5.0 Build 20211201 allows attackers to escalate privileges via modification of the 'tid' and 'usrlvl' values in GET requests.
References
Link Resource
https://github.com/str2ver/CVE-2023-43318/tree/main Third Party Advisory
https://seclists.org/fulldisclosure/2024/Mar/9 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tl-sg2210p_firmware:5.0:build_20211201:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-sg2210p:-:*:*:*:*:*:*:*

History

12 Mar 2024, 15:01

Type Values Removed Values Added
CPE cpe:2.3:o:tp-link:tl-sg2210p_firmware:5.0:build_20211201:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-sg2210p:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE NVD-CWE-Other
First Time Tp-link
Tp-link tl-sg2210p
Tp-link tl-sg2210p Firmware
References () https://github.com/str2ver/CVE-2023-43318/tree/main - () https://github.com/str2ver/CVE-2023-43318/tree/main - Third Party Advisory
References () https://seclists.org/fulldisclosure/2024/Mar/9 - () https://seclists.org/fulldisclosure/2024/Mar/9 - Mailing List, Third Party Advisory

06 Mar 2024, 15:18

Type Values Removed Values Added
Summary
  • (es) TP-Link JetStream Smart Switch TL-SG2210P 5.0 Build 20211201 permite a los atacantes escalar privilegios mediante la modificación de los valores 'tid' y 'usrlvl' en las solicitudes GET.

06 Mar 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-06 00:15

Updated : 2024-03-12 15:01


NVD link : CVE-2023-43318

Mitre link : CVE-2023-43318

CVE.ORG link : CVE-2023-43318


JSON object : View

Products Affected

tp-link

  • tl-sg2210p_firmware
  • tl-sg2210p