Symlink Following Vulnerability in TP-Link Router Firmware
CVE-2020-5797
6.1MEDIUM
Summary
A vulnerability in the TP-Link Archer C9(US)_V1_180125 firmware allows unauthenticated individuals with physical and network access to the router to exploit symbolic link following. By connecting a specially crafted USB drive to the router, an attacker can access and read sensitive files on the device. Additionally, the vulnerability permits writing to a limited set of files, further compromising the router's security and potential network integrity.
Affected Version(s)
TP-Link Archer C9 A1 Archer C9(US)_V1_180125 firmware
References
CVSS V3.1
Score:
6.1
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Physical
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved