Advisory Details

November 21st, 2022

TP-Link TL-WR940N httpd Incorrect Implementation of Authentication Algorithm Information Disclosure Vulnerability

ZDI-22-1615
ZDI-CAN-17332

CVE ID CVE-2022-43635
CVSS SCORE 6.5, AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AFFECTED VENDORS TP-Link
AFFECTED PRODUCTS TL-WR940N
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR940N routers. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from the incorrect implementation of the authentication algorithm. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.

ADDITIONAL DETAILS

Fixed in TL-WR940N(US)_V6_3.20.1 Build 220801


DISCLOSURE TIMELINE
  • 2022-08-25 - Vulnerability reported to vendor
  • 2022-11-21 - Coordinated public release of advisory
CREDIT ExLuck
BACK TO ADVISORIES