INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Information Technology CRITICAL 37m Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 10h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 17h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 17h Global phishing Multiple sectors HIGH 17h Global vulnerability Information Technology CRITICAL 37m Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 10h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 17h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 17h Global phishing Multiple sectors HIGH 17h Global vulnerability Information Technology CRITICAL 37m Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 10h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 17h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 17h Global phishing Multiple sectors HIGH 17h
Vulnerabilities

CVE-2015-3035

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
TP-Link Multiple Archer Devices Directory Traversal Vulnerability — Directory traversal vulnerability in multiple TP-Link Archer devices allows remote attackers to read arbitrary files via a .. (dot d
Published: Mar 25, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

TP-Link Multiple Archer Devices Directory Traversal Vulnerability — Directory traversal vulnerability in multiple TP-Link Archer devices allows remote attackers to read arbitrary files via a .. (dot dot) in the PATH_INFO to login/.

🤖 AI Executive Summary

A critical directory traversal vulnerability (CVE-2015-3035) affects multiple TP-Link Archer router models, allowing unauthenticated remote attackers to read arbitrary files from the device filesystem. With a CVSS score of 9.0 and publicly available exploits, this vulnerability poses an immediate threat to organizations relying on these devices for network access. The vulnerability enables attackers to extract sensitive configuration files, credentials, and system information without authentication.

📄 Description (Arabic)

ثغرة اجتياز مجلدات في أجهزة TP-Link Archer المتعددة تسمح للمهاجمين البعيدين بقراءة ملفات عشوائية من النظام عن طريق إرسال طلب يحتوي على نقاط متتالية (..) في معامل PATH_INFO الموجه إلى صفحة تسجيل الدخول (login/). هذا يمكن المهاجم من الوصول إلى ملفات حساسة خارج المجلد المقصود.

🤖 ملخص تنفيذي (AI)

ثغرة اجتياز مجلدات في أجهزة TP-Link Archer المتعددة تسمح للمهاجمين البعيدين بقراءة ملفات عشوائية عبر استخدام (..) في PATH_INFO إلى login/

🤖 AI Intelligence Analysis Analyzed: Apr 2, 2026 12:22
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability critically impacts Saudi organizations across multiple sectors: Banking and financial institutions (SAMA-regulated) using TP-Link Archer devices for network infrastructure face exposure of authentication credentials and transaction data. Government agencies and critical infrastructure operators (NCA oversight) are at high risk of unauthorized access to sensitive networks. Telecommunications providers (STC, Mobily) and ISPs using these routers for customer-facing infrastructure could experience widespread compromise. Healthcare facilities and ARAMCO-affiliated energy sector organizations relying on these devices for network segmentation face potential data exfiltration. SMEs and corporate networks throughout Saudi Arabia using consumer-grade TP-Link Archer routers are particularly vulnerable due to limited patch deployment rates.
🏢 Affected Saudi Sectors
Banking and Financial Services Government and Public Administration Telecommunications Energy and Utilities Healthcare Critical Infrastructure Small and Medium Enterprises
⚖️ Saudi Risk Score (AI)
8.8
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all TP-Link Archer devices in your network infrastructure using network scanning tools
2. Isolate affected devices from critical network segments if patching cannot be immediately deployed
3. Review access logs for suspicious directory traversal attempts (patterns with ../ in HTTP requests)
4. Change all administrative credentials on affected devices immediately

PATCHING GUIDANCE:
1. Visit TP-Link support portal and download the latest firmware for your specific Archer model
2. Apply firmware updates through device web interface (Administration > System Tools > Firmware Upgrade)
3. Verify successful update by checking firmware version in device settings
4. Test network connectivity after each device update

COMPENSATING CONTROLS (if immediate patching not possible):
1. Implement network access controls restricting device management interfaces to authorized IPs only
2. Deploy WAF/IPS rules blocking HTTP requests containing ../ sequences to router management ports
3. Segment router management traffic on separate VLAN with restricted access
4. Monitor for exploitation attempts using SIEM correlation rules

DETECTION RULES:
1. Alert on HTTP requests to /login/ containing ../ or %2e%2e%2f patterns
2. Monitor for unusual file read operations from router web service process
3. Track failed and successful authentication attempts to router management interface
4. Flag any outbound connections from router to external IPs on non-standard ports
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع أجهزة TP-Link Archer في البنية التحتية للشبكة باستخدام أدوات فحص الشبكة
2. عزل الأجهزة المتأثرة عن قطاعات الشبكة الحرجة إذا لم يكن التصحيح ممكناً فوراً
3. مراجعة سجلات الوصول للمحاولات المريبة لاجتياز المجلدات (أنماط تحتوي على ../ في طلبات HTTP)
4. تغيير جميع بيانات اعتماد المسؤول على الأجهزة المتأثرة فوراً

إرشادات التصحيح:
1. زيارة بوابة دعم TP-Link وتنزيل أحدث البرامج الثابتة لطراز Archer المحدد
2. تطبيق تحديثات البرامج الثابتة من خلال واجهة الويب للجهاز (الإدارة > أدوات النظام > ترقية البرامج الثابتة)
3. التحقق من نجاح التحديث بفحص إصدار البرامج الثابتة في إعدادات الجهاز
4. اختبار اتصال الشبكة بعد تحديث كل جهاز

الضوابط البديلة (إذا لم يكن التصحيح الفوري ممكناً):
1. تطبيق ضوابط الوصول إلى الشبكة تقيد واجهات إدارة الجهاز إلى عناوين IP المصرح بها فقط
2. نشر قواعد WAF/IPS تحجب طلبات HTTP التي تحتوي على تسلسلات ../ إلى منافذ إدارة الموجه
3. فصل حركة إدارة الموجه على VLAN منفصل مع وصول مقيد
4. مراقبة محاولات الاستغلال باستخدام قواعد ارتباط SIEM

قواعد الكشف:
1. تنبيه على طلبات HTTP إلى /login/ تحتوي على أنماط ../ أو %2e%2e%2f
2. مراقبة عمليات قراءة الملفات غير العادية من عملية خدمة الويب للموجه
3. تتبع محاولات المصادقة الفاشلة والناجحة لواجهة إدارة الموجه
4. وضع علامة على أي اتصالات صادرة من الموجه إلى عناوين IP خارجية على منافذ غير قياسية
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
A.5.1.1 - Information Security Policies (device security configuration) A.6.1.1 - Internal Organization (access control to network devices) A.8.1.1 - Asset Management (inventory and patching of network equipment) A.12.2.1 - Change Management (firmware update procedures) A.12.6.1 - Management of Technical Vulnerabilities (vulnerability assessment and remediation)
🔵 SAMA CSF
ID.AM-2 - Asset Management (identify and manage network infrastructure) PR.AC-1 - Access Control Policy (restrict unauthorized access to devices) PR.PT-2 - Protective Technology (implement compensating controls) DE.CM-8 - Vulnerability Scans (detect affected devices) RS.MI-2 - Incident Mitigation (contain and remediate exploitation)
🟡 ISO 27001:2022
A.5.1 - Management Direction (information security policy for device management) A.8.1 - Asset Management (inventory of network devices) A.12.2 - Change Management (firmware update procedures) A.12.6 - Management of Technical Vulnerabilities (patch management) A.13.1 - Network Security (network access controls)
🟣 PCI DSS v4.0
Requirement 1.1 - Firewall Configuration Standards (restrict access to router management) Requirement 2.1 - Default Passwords (change router credentials) Requirement 6.2 - Security Patches (apply firmware updates) Requirement 11.2 - Vulnerability Scanning (identify affected devices)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
TP-Link:Multiple Archer Devices
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS92.86%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-04-15
Published 2022-03-25
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
8.8
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.