First published: Wed May 30 2018(Updated: )
TP-LINK IPC TL-IPC223(P)-6, TL-IPC323K-D, TL-IPC325(KP)-*, and TL-IPC40A-4 devices allow authenticated remote code execution via crafted JSON data because /usr/lib/lua/luci/torchlight/validator.lua does not block various punctuation characters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Ipc Tl-ipc223\(p\)-6 Firmware | <1.0.21 | |
Tp-link Ipc Tl-ipc223\(p\)-6 | ||
Tp-link Tl-ipc323k-d Firmware | <1.0.21 | |
Tp-link Tl-ipc323k-d | ||
Tp-link Tl-ipc325\(kp\) Firmware | <1.0.21 | |
Tp-link Tl-ipc325\(kp\) | ||
Tp-link Tl-ipc40a-4 Firmware | <1.0.21 | |
Tp-link Tl-ipc40a-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.