← Back to CVEs
CVE-2023-22303
CRITICAL9.8
Description
TP-Link SG105PE firmware prior to 'TL-SG105PE(UN) 1.0_1.0.0 Build 20221208' contains an authentication bypass vulnerability. Under the certain conditions, an attacker may impersonate an administrator of the product. As a result, information may be obtained and/or the product's settings may be altered with the privilege of the administrator.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published1/17/2023
Last Modified4/4/2025
Sourcenvd
Honeypot Sightings0
Affected Products
tp-link:tl-sg105petp-link:tl-sg105pe_firmware
Weaknesses (CWE)
CWE-287CWE-287
References
https://jvn.jp/en/jp/JVN78481846/index.html(vultures@jpcert.or.jp)
https://www.tp-link.com/en/business-networking/easy-smart-switch/tl-sg105pe/(vultures@jpcert.or.jp)
https://www.tp-link.com/jp/support/download/tl-sg105pe/v1/#Firmware(vultures@jpcert.or.jp)
https://jvn.jp/en/jp/JVN78481846/index.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.tp-link.com/en/business-networking/easy-smart-switch/tl-sg105pe/(af854a3a-2127-422b-91ae-364da2661108)
https://www.tp-link.com/jp/support/download/tl-sg105pe/v1/#Firmware(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.