First published: Tue Dec 19 2017(Updated: )
TP-Link TL-WVR and TL-WAR devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the interface field of an admin/dhcps command to cgi-bin/luci, related to the zone_get_iface_bydev function in /usr/lib/lua/luci/controller/admin/dhcps.lua in uhttpd.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wvr450l Firmware | ||
Tp-link Tl-wvr450l | ||
Tp-link Tl-wvr458l Firmware | ||
Tp-link Tl-wvr458l | ||
Tp-link Tl-wvr900l Firmware | ||
Tp-link Tl-wvr900l | ||
Tp-link Tl-wvr1200l Firmware | ||
Tp-link Tl-wvr1200l | ||
Tp-link Tl-wvr1300l Firmware | ||
Tp-link Tl-wvr1300l | ||
Tp-link Tl-wvr1750l Firmware | ||
Tp-link Tl-wvr1750l | ||
Tp-link Tl-wvr2600l Firmware | ||
Tp-link Tl-wvr2600l | ||
Tp-link Tl-wvr4300l Firmware | ||
Tp-link Tl-wvr4300l | ||
Tp-link Tl-war450l Firmware | ||
Tp-link Tl-war450l | ||
Tp-link Tl-war458l Firmware | ||
Tp-link Tl-war458l | ||
Tp-link Tl-war900l Firmware | ||
Tp-link Tl-war900l | ||
Tp-link Tl-war1200l Firmware | ||
Tp-link Tl-war1200l | ||
Tp-link Tl-war1300l Firmware | ||
Tp-link Tl-war1300l | ||
Tp-link Tl-war1750l Firmware | ||
Tp-link Tl-war1750l | ||
Tp-link Tl-war2600l Firmware | ||
Tp-link Tl-war2600l |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2017-17758.
The severity of CVE-2017-17758 is critical with a score of 8.8.
TP-Link TL-WVR and TL-WAR devices are affected.
Remote authenticated users can exploit CVE-2017-17758 by executing arbitrary commands via shell metacharacters in the interface field of an admin/dhcps command to cgi-bin/luci.
The fix for CVE-2017-17758 is not mentioned in the provided information.