First published: Mon May 04 2020(Updated: )
Certain TP-Link devices allow Command Injection. This affects NC260 1.5.2 build 200304 and NC450 1.5.3 build 200304.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Nc260 Firmware | =1.0.5-160804 | |
Tp-link Nc260 Firmware | =1.0.6-161114 | |
Tp-link Nc260 Firmware | =1.4.1-180720 | |
Tp-link Nc260 Firmware | =1.5.0-181123 | |
Tp-link Nc260 Firmware | =1.5.2-200304 | |
Tp-link Nc260 | ||
Tp-link Nc450 Firmware | =1.0.15-160920 | |
Tp-link Nc450 Firmware | =1.1.2-161013 | |
Tp-link Nc450 Firmware | =1.3.4-171130 | |
Tp-link Nc450 Firmware | =1.5.3-200304 | |
Tp-link Nc450 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12111 is a vulnerability that allows Command Injection in certain TP-Link devices.
NC260 1.5.2 build 200304 and NC450 1.5.3 build 200304 are affected by CVE-2020-12111.
CVE-2020-12111 has a severity rating of 8.8 (critical).
To fix CVE-2020-12111, it is recommended to update the firmware of the affected devices to a version that is not vulnerable.
For more information about CVE-2020-12111, you can refer to the following references: [Reference 1](http://packetstormsecurity.com/files/157533/TP-LINK-Cloud-Cameras-NCXXX-SetEncryptKey-Command-Injection.html), [Reference 2](https://seclists.org/fulldisclosure/2020/May/4), [Reference 3](https://www.tp-link.com/us/security).