U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2015-3035

Change History

Modified Analysis by NIST 4/23/2015 12:56:06 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
Configuration 1
     AND
          OR
               *cpe:2.3:o:tp-link:tl-wrd741nd_\(5.0\)_firmware:141217:*:*:*:*:*:*:* (and previous)
          OR
               *cpe:2.3:h:tp-link:tl-wrd741nd_\(5.0\):*:*:*:*:*:*:*:*
Configuration 2
     AND
          OR
               *cpe:2.3:o:tp-link:tl-wrd841nd_\(9.0\)_firmware:150104:*:*:*:*:*:*:* (and previous)
          OR
               cpe:2.3:h:tp-link:tl-wrd841nd_\(9.0\):*:*:*:*:*:*:*:*
Configuration 3
     AND
          OR
               *cpe:2.3:o:tp-link:tl-wrd841nd_\(10.0\)_firmware:150104:*:*:*:*:*:*:*
          OR
               cpe:2.3:h:tp-link:tl-wrd841nd_\(10.0\):*:*:*:*:*:*:*:*
Configuration 4
     AND
          OR
               *cpe:2.3:o:tp-link:archer_c8_\(1.0\)_firmware:141023:*:*:*:*:*:*:* (and previous)
          OR
               cpe:2.3:h:tp-link:archer_c8_\(1.0\):*:*:*:*:*:*:*:*
Configuration 5
     AND
          OR
               *cpe:2.3:o:tp-link:tl-wdr3600_\(1.0\)_firmware:141022:*:*:*:*:*:*:* (and previous)
          OR
               cpe:2.3:h:tp-link:tl-wdr3600_\(1.0\):*:*:*:*:*:*:*:*
Configuration 6
     AND
          OR
               *cpe:2.3:o:tp-link:archer_c5_\(1.2\)_firmware:141126:*:*:*:*:*:*:* (and previous)
          OR
               cpe:2.3:h:tp-link:archer_c5_\(1.2\):*:*:*:*:*:*:*:*
Configuration 7
     AND
          OR
               *cpe:2.3:o:tp-link:tl-wrd740n_\(5.0\)_firmware:141217:*:*:*:*:*:*:* (and previous)
          OR
               cpe:2.3:h:tp-link:tl-wrd740n_\(5.0\):*:*:*:*:*:*:*:*
Configuration 8
     AND
          OR
               *cpe:2.3:o:tp-link:tl-wrd841n_\(9.0\)_firmware:*:*:*:*:*:*:*:* (and previous)
          OR
               cpe:2.3:h:tp-link:tl-wrd841n_\(9.0\):*:*:*:*:*:*:*:*
Configuration 9
     AND
          OR
               *cpe:2.3:o:tp-link:tl-wdr3500_\(1.0\)_firmware:141113:*:*:*:*:*:*:* (and previous)
          OR
               cpe:2.3:h:tp-link:tl-wdr3500_\(1.0\):*:*:*:*:*:*:*:*
Configuration 10
     AND
          OR
               *cpe:2.3:o:tp-link:archer_c7_\(2.0\)_firmware:141110:*:*:*:*:*:*:* (and previous)
          OR
               cpe:2.3:h:tp-link:archer_c7_\(2.0\):*:*:*:*:*:*:*:*
Configuration 11
     AND
          OR
               *cpe:2.3:o:tp-link:archer_c9_\(1.0\)_firmware:150122:*:*:*:*:*:*:* (and previous)
          OR
               cpe:2.3:h:tp-link:archer_c9_\(1.0\):*:*:*:*:*:*:*:*
Configuration 12
     AND
          OR
               *cpe:2.3:o:tp-link:tl-wdr4300_\(1.0\)_firmware:141113:*:*:*:*:*:*:* (and previous)
          OR
               cpe:2.3:h:tp-link:tl-wdr4300_\(1.0\):*:*:*:*:*:*:*:*
Configuration 13
     AND
          OR
               *cpe:2.3:o:tp-link:tl-wrd841n_\(10.0\)_firmware:*:*:*:*:*:*:*:* (and previous)
          OR
               cpe:2.3:h:tp-link:tl-wrd841n_\(10.0\):*:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
(AV:N/AC:L/Au:N/C:C/I:N/A:N)
Added CWE

								
							
							
						
CWE-22
Changed Reference Type
http://packetstormsecurity.com/files/131378/TP-LINK-Local-File-Disclosure.html No Types Assigned
http://packetstormsecurity.com/files/131378/TP-LINK-Local-File-Disclosure.html Exploit
Changed Reference Type
http://seclists.org/fulldisclosure/2015/Apr/26 No Types Assigned
http://seclists.org/fulldisclosure/2015/Apr/26 Exploit
Changed Reference Type
http://www.securityfocus.com/archive/1/archive/1/535240/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/archive/1/535240/100/0/threaded Exploit
Changed Reference Type
http://www.tp-link.com/en/download/Archer-C5_V1.20.html#Firmware No Types Assigned
http://www.tp-link.com/en/download/Archer-C5_V1.20.html#Firmware Patch
Changed Reference Type
http://www.tp-link.com/en/download/Archer-C7_V2.html#Firmware No Types Assigned
http://www.tp-link.com/en/download/Archer-C7_V2.html#Firmware Patch
Changed Reference Type
http://www.tp-link.com/en/download/Archer-C8_V1.html#Firmware No Types Assigned
http://www.tp-link.com/en/download/Archer-C8_V1.html#Firmware Patch
Changed Reference Type
http://www.tp-link.com/en/download/Archer-C9_V1.html#Firmware No Types Assigned
http://www.tp-link.com/en/download/Archer-C9_V1.html#Firmware Patch
Changed Reference Type
http://www.tp-link.com/en/download/TL-WDR3500_V1.html#Firmware No Types Assigned
http://www.tp-link.com/en/download/TL-WDR3500_V1.html#Firmware Patch
Changed Reference Type
http://www.tp-link.com/en/download/TL-WDR3600_V1.html#Firmware No Types Assigned
http://www.tp-link.com/en/download/TL-WDR3600_V1.html#Firmware Patch
Changed Reference Type
http://www.tp-link.com/en/download/TL-WDR4300_V1.html#Firmware No Types Assigned
http://www.tp-link.com/en/download/TL-WDR4300_V1.html#Firmware Patch
Changed Reference Type
http://www.tp-link.com/en/download/TL-WR740N_V5.html#Firmware No Types Assigned
http://www.tp-link.com/en/download/TL-WR740N_V5.html#Firmware Patch
Changed Reference Type
http://www.tp-link.com/en/download/TL-WR741ND_V5.html#Firmware No Types Assigned
http://www.tp-link.com/en/download/TL-WR741ND_V5.html#Firmware Patch
Changed Reference Type
http://www.tp-link.com/en/download/TL-WR841ND_V9.html#Firmware No Types Assigned
http://www.tp-link.com/en/download/TL-WR841ND_V9.html#Firmware Patch
Changed Reference Type
http://www.tp-link.com/en/download/TL-WR841N_V9.html#Firmware No Types Assigned
http://www.tp-link.com/en/download/TL-WR841N_V9.html#Firmware Patch
Changed Reference Type
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150410-0_TP-Link_Unauthenticated_local_file_disclosure_vulnerability_v10.txt No Types Assigned
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150410-0_TP-Link_Unauthenticated_local_file_disclosure_vulnerability_v10.txt Exploit