First published: Tue Apr 25 2017(Updated: )
TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow remote code execution with a single HTTP request by placing shell commands in a "host=" line within HTTP POST data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link C2 Firmware | <=0.9.1_4.2_v0032.0_build_160706 | |
TP-Link C2 | ||
Tp-link C20i Firmware | <=0.9.1_4.2_v0032.0_build_160706 | |
Tp-link C20i |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8220 is considered a high-severity vulnerability due to the potential for remote code execution.
To fix CVE-2017-8220, users should update their TP-Link C2 and C20i devices to the latest firmware version available.
CVE-2017-8220 affects TP-Link C2 and C20i devices running firmware versions up to 0.9.1 4.2 v0032.0 Build 160706.
Exploiting CVE-2017-8220 allows an attacker to execute arbitrary shell commands remotely on the affected TP-Link devices.
CVE-2017-8220 can be exploited by sending a specially crafted HTTP POST request containing shell commands in the "host=" line.