9

CVE-2017-16958

Exploit

TP-Link TL-WVR, TL-WAR, TL-ER, and TL-R devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the t_bindif field of an admin/bridge command to cgi-bin/luci, related to the get_device_byif function in /usr/lib/lua/luci/controller/admin/bridge.lua in uhttpd.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Tp-linkTl-wvr300 Firmware Version-
   Tp-linkTl-wvr300 Version-
Tp-linkTl-wvr302 Firmware Version-
   Tp-linkTl-wvr302 Version-
Tp-linkTl-wvr450 Firmware Version-
   Tp-linkTl-wvr450 Version-
Tp-linkTl-wvr450l Firmware Version-
   Tp-linkTl-wvr450l Version-
Tp-linkTl-wvr450g Firmware Version-
   Tp-linkTl-wvr450g Version-
Tp-linkTl-wvr458 Firmware Version-
   Tp-linkTl-wvr458 Version-
Tp-linkTl-wvr458l Firmware Version-
   Tp-linkTl-wvr458l Version-
Tp-linkTl-wvr458p Firmware Version-
   Tp-linkTl-wvr458p Version-
Tp-linkTl-wvr900g Firmware Version-
   Tp-linkTl-wvr900g Version-
Tp-linkTl-wvr900l Firmware Version-
   Tp-linkTl-wvr900l Version-
Tp-linkTl-wvr1200l Firmware Version-
   Tp-linkTl-wvr1200l Version-
Tp-linkTl-wvr1300l Firmware Version-
   Tp-linkTl-wvr1300l Version-
Tp-linkTl-wvr1300g Firmware Version-
   Tp-linkTl-war1300g Version-
Tp-linkTl-wvr1750l Firmware Version-
   Tp-linkTl-wvr1750l Version-
Tp-linkTl-war2600l Firmware Version-
   Tp-linkTl-wvr2600l Version-
Tp-linkTl-wvr4300l Firmware Version-
   Tp-linkTl-wvr4300l Version-
Tp-linkTl-war302 Firmware Version-
   Tp-linkTl-war302 Version-
Tp-linkTl-war450 Firmware Version-
   Tp-linkTl-war450 Version-
Tp-linkTl-war450l Firmware Version-
   Tp-linkTl-war450l Version-
Tp-linkTl-war458 Firmware Version-
   Tp-linkTl-war458 Version-
Tp-linkTl-war458l Firmware Version-
   Tp-linkTl-war458l Version-
Tp-linkTl-war900l Firmware Version-
   Tp-linkTl-war900l Version-
Tp-linkTl-war1200l Firmware Version-
   Tp-linkTl-war1200l Version-
Tp-linkTl-war1300l Firmware Version-
   Tp-linkTl-war1300l Version-
Tp-linkTl-war1750l Firmware Version-
   Tp-linkTl-war1750l Version-
Tp-linkTl-war2600l Firmware Version-
   Tp-linkTl-war2600l Version-
Tp-linkTl-er3210g Firmware Version-
   Tp-linkTl-er3210g Version-
Tp-linkTl-er3220g Firmware Version-
   Tp-linkTl-er3220g Version-
Tp-linkTl-er5110g Firmware Version-
   Tp-linkTl-er5110g Version-
Tp-linkTl-er5120g Firmware Version-
   Tp-linkTl-er5120g Version-
Tp-linkTl-er5510g Firmware Version-
   Tp-linkTl-er5510g Version-
Tp-linkTl-er5520g Firmware Version-
   Tp-linkTl-er5520g Version-
Tp-linkTl-er6110g Firmware Version-
   Tp-linkTl-er6110g Version-
Tp-linkTl-er6120g Firmware Version-
   Tp-linkTl-er6120g Version-
Tp-linkTl-er6220g Firmware Version-
   Tp-linkTl-er6220g Version-
Tp-linkTl-er6510g Firmware Version-
   Tp-linkTl-er6510g Version-
Tp-linkTl-er6520g Firmware Version-
   Tp-linkTl-er6520g Version-
Tp-linkTl-er7520g Firmware Version-
   Tp-linkTl-er7520g Version-
Tp-linkTl-r473 Firmware Version-
   Tp-linkTl-r473 Version-
Tp-linkTl-r473g Firmware Version-
   Tp-linkTl-r473g Version-
Tp-linkTl-r473p-ac Firmware Version-
   Tp-linkTl-r473p-ac Version-
Tp-linkTl-r479gp-ac Firmware Version-
   Tp-linkTl-r473gp-ac Version-
Tp-linkTl-r478 Firmware Version-
   Tp-linkTl-r478 Version-
Tp-linkTl-r478g Firmware Version-
   Tp-linkTl-r478g Version-
Tp-linkTl-r479p-ac Firmware Version-
   Tp-linkTl-r479p-ac Version-
Tp-linkTl-r479gp-ac Firmware Version-
   Tp-linkTl-r479gp-ac Version-
Tp-linkTl-r479gpe-ac Firmware Version-
   Tp-linkTl-r479gpe-ac Version-
Tp-linkTl-r483 Firmware Version-
   Tp-linkTl-r483 Version-
Tp-linkTl-r483g Firmware Version-
   Tp-linkTl-r483g Version-
Tp-linkTl-r488 Firmware Version-
   Tp-linkTl-r488 Version-
Tp-linkTl-r4149g Firmware Version-
   Tp-linkTl-r4149g Version-
Tp-linkTl-r4239g Firmware Version-
   Tp-linkTl-r4239g Version-
Tp-linkTl-r4299g Firmware Version-
   Tp-linkTl-r4299g Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.37% 0.794
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 9 8 10
AV:N/AC:L/Au:S/C:C/I:C/A:C
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.