{ "id": "CVE-2021-3125", "sourceIdentifier": "cve@mitre.org", "published": "2021-04-12T19:15:14.753", "lastModified": "2021-04-21T16:09:26.750", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In TP-Link TL-XDR3230 < 1.0.12, TL-XDR1850 < 1.0.9, TL-XDR1860 < 1.0.14, TL-XDR3250 < 1.0.2, TL-XDR6060 Turbo < 1.1.8, TL-XDR5430 < 1.0.11, and possibly others, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set." }, { "lang": "es", "value": "En TP-Link TL-XDR3230 versiones anteriores a 1.0.12, TL-XDR1850 versiones anteriores a 1.0.9, TL-XDR1860 versiones anteriores a 1.0.14, TL-XDR3250 versiones anteriores a 1.0.2, TL-XDR6060 Turbo versiones anteriores a 1.1.8, TL-XDR5430 versiones anteriores a 1.0 .11, y posiblemente otros, cuando se utiliza IPv6, puede producirse un bucle de enrutamiento que genere un tr\u00e1fico de red excesivo entre un dispositivo afectado y el enrutador de su ISP aguas arriba. Esto ocurre cuando una ruta de prefijo de enlace apunta a un enlace punto a punto, una direcci\u00f3n IPv6 de destino pertenece al prefijo y no es una direcci\u00f3n IPv6 local, y un anuncio de enrutador es recibido con al menos un prefijo IPv6 \u00fanico global para el cual el flag on-link se establece" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-834" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:tp-link:tl-xdr3230_firmware:*:*:*:*:*:easy_exhibition_turbo:*:*", "versionEndExcluding": "1.0.12", "matchCriteriaId": "A0D17DEE-C4E7-478E-B70E-CDE2F775C8C7" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:tp-link:tl-xdr3230:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F2F0B3B-F393-4667-B579-FF7E53494A8C" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:tp-link:tl-xdr5430_firmware:*:*:*:*:*:easy_exhibition:*:*", "versionEndExcluding": "1.0.11", "matchCriteriaId": "9748491C-2C0F-4C87-94BA-4D01F5B334AC" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:tp-link:tl-xdr5430:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB818559-2DD9-41FF-8160-33E59516F061" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:tp-link:tl-xdr3250_firmware:*:*:*:*:*:easy_exhibition:*:*", "versionEndExcluding": "1.0.2", "matchCriteriaId": "3DB26B3D-F802-429D-B303-00F1ECF085AC" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:tp-link:tl-xdr3250:-:*:*:*:*:*:*:*", "matchCriteriaId": "36FE5CF6-4941-4E9E-8584-E9BA6BA73D72" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:tp-link:tl-xdr1860_firmware:*:*:*:*:*:easy_exhibition:*:*", "versionEndExcluding": "1.0.14", "matchCriteriaId": "8B1FC40F-5F0A-458D-B00D-BF933BA0136C" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:tp-link:tl-xdr1860:-:*:*:*:*:*:*:*", "matchCriteriaId": "37F81B38-9711-4748-A8C4-B65F0FB94AD8" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:tp-link:tl-xdr1850_firmware:*:*:*:*:*:easy_exhibition:*:*", "versionEndExcluding": "1.0.9", "matchCriteriaId": "3897116B-E78E-40B1-986B-24456237B852" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:tp-link:tl-xdr1850:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4DAC6CF-72E8-47A4-9803-80171D5E0055" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:tp-link:tl-xdr6060_firmware:*:*:*:*:*:easy_exhibition:*:*", "versionEndExcluding": "1.1.8", "matchCriteriaId": "315B5D50-DB9F-476D-8F16-1F51ED6AC143" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:tp-link:tl-xdr6060:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A60FB6-25AC-4443-AA29-8E13944E3F8A" } ] } ] } ], "references": [ { "url": "https://service.tp-link.com.cn/detail_download_8719.html", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "https://service.tp-link.com.cn/detail_download_8720.html", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "https://service.tp-link.com.cn/detail_download_8722.html", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "https://service.tp-link.com.cn/detail_download_8723.html", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "https://service.tp-link.com.cn/detail_download_8724.html", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "https://service.tp-link.com.cn/detail_download_8725.html", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] } ] }