TP-Link Unauthenticated CGI Cross-Site Request Forgery (Remote)

Critical Nessus Plugin ID 117861

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 5.9


The remote host is affected by multiple vulnerabilities.


The TP-Link web interface on the remote host is vulnerable to a cross-site request forgery and an authentication bypass vulnerability. An unauthenticated attacker could leverage these vulnerabilities to bypass authentication and potentially gain administrative access to the affected host.


Contact the device vendor for updated firmware. Additionally, access control may be implemented to mitigate these vulnerabilities.

See Also

Plugin Details

Severity: Critical

ID: 117861

File Name: tplink_referer_csrf.nbin

Version: 1.27

Type: remote

Family: CGI abuses

Published: 2018/10/01

Updated: 2020/09/30

Dependencies: 117860

Risk Information

Risk Factor: Critical

VPR Score: 5.9

CVSS Score Source: CVE-2018-11714

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3.0

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:tp-link:tp-link

Required KB Items: installed_sw/TP-Link Web UI

Excluded KB Items: Settings/disable_cgi_scanning

Exploited by Nessus: true

Vulnerability Publication Date: 2018/10/01

Reference Information

CVE: CVE-2018-15702, CVE-2018-11714