CVE-2019-12195
low-risk
Published 2019-05-24
TP-Link TL-WR840N v5 00000005 devices allow XSS via the network name. The attacker must log into the router by breaking the password and going to the admin login page by THC-HYDRA to get the network name. With an XSS payload, the network name changed automatically and the internet connection was disconnected. All the users become disconnected from the internet.
Do I need to act?
-
0.45% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.8/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (4)
Third Party Advisory
http://packetstormsecurity.com/files/153027/TP-LINK-TL-WR840N-Cross-Site-Scripti...
Vendor Advisory
https://www.tp-link.com/us/security
Third Party Advisory
http://packetstormsecurity.com/files/153027/TP-LINK-TL-WR840N-Cross-Site-Scripti...
Vendor Advisory
https://www.tp-link.com/us/security
26
/ 100
low-risk
Severity
19/34 · Moderate
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal