First published: Tue Apr 25 2017(Updated: )
TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow DoSing the HTTP server via a crafted Cookie header to the /cgi/ansi URI.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link C2 Firmware | <=0.9.1_4.2_v0032.0_build_160706 | |
TP-Link C2 Firmware | ||
TP-Link C20i Firmware | <=0.9.1_4.2_v0032.0_build_160706 | |
TP-Link Archer C20i |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8219 is classified as a high severity vulnerability due to its ability to allow denial of service attacks on affected devices.
To mitigate CVE-2017-8219, update the firmware of TP-Link C2 and C20i devices to a version later than 0.9.1_4.2_v0032.0_build_160706.
CVE-2017-8219 affects TP-Link C2 and C20i devices running firmware version 0.9.1_4.2_v0032.0_build_160706 or earlier.
CVE-2017-8219 enables a denial of service attack against the HTTP server of the affected devices via a crafted Cookie header.
There is no documented workaround for CVE-2017-8219, so updating the firmware is the recommended approach.