TP-Link HTTP Server Detection

info Nessus Plugin ID 117860
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

It is possible to fingerprint the remote TP-Link HTTP server.

Description

The remote host has an accessible TP-Link HTTP administrative page.
It is possible to determine the model information from the host.

See Also

https://www.tp-link.com/us/

Plugin Details

Severity: Info

ID: 117860

File Name: tplink_web_detect.nbin

Version: 1.38

Type: remote

Family: Web Servers

Published: 10/1/2018

Updated: 12/20/2021

Dependencies: http_version.nasl

Asset Inventory: true

Vulnerability Information

CPE: cpe:/a:tp-link:tp-link

Excluded KB Items: Settings/disable_cgi_scanning