{"vuid":"VU#185100","idnumber":"185100","name":"TP-LINK TL-WR841N wireless router local file inclusion vulnerability","keywords":["TP-LINK","TL-WR841N","local file inclusion","cwe-829"],"overview":"The TP-LINK TL-WR841N wireless router contains a local file inclusion vulnerability which could allow an attacker to download critical configuration files off the device.","clean_desc":"CWE-829: Inclusion of Functionality from Untrusted Control Sphere\nThe TP-LINK TL-WR841N wireless router web-based management interface contains a local file inclusion (LFI) vulnerability. The URL parameter is not properly sanitized before being parsed. It has been reported that TP-LINK TL-WR841N wireless router running firmware version: 3.13.9 Build 120201 Rel.54965n and below are affected.","impact":"An attacker with access to the TP-LINK TL-WR841N web interface could download critical configuration files off the device.","resolution":"We are currently unaware of a practical solution to this problem.","workarounds":"Restrict access As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent local file inclusion attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing the TP-LINK TL-WR841N web interface using stolen credentials from a blocked network location.","sysaffected":"","thanks":"Thanks to Matan Azugi for reporting this vulnerability.","author":"This document was written by Michael Orlando.","public":["http://www.tp-link.com/en/products/details/?model=TL-WR841N","http://cwe.mitre.org/data/definitions/829.html"],"cveids":["CVE-2012-6276"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2012-10-30T15:02:43Z","publicdate":"2013-01-11T00:00:00Z","datefirstpublished":"2013-01-11T13:23:13Z","dateupdated":"2013-01-11T13:23:13Z","revision":7,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"N","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"W","cvss_reportconfidence":"UC","cvss_collateraldamagepotential":"L","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"4.3","cvss_basevector":"AV:N/AC:M/Au:N/C:P/I:N/A:N","cvss_temporalscore":"3.1","cvss_environmentalscore":"0.9","cvss_environmentalvector":"CDP:L/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}