6.5

CVE-2017-16959

Exploit

The locale feature in cgi-bin/luci on TP-Link TL-WVR, TL-WAR, TL-ER, and TL-R devices allows remote authenticated users to test for the existence of arbitrary files by making an operation=write;locale=%0d request, and then making an operation=read request with a crafted Accept-Language HTTP header, related to the set_sysinfo and get_sysinfo functions in /usr/lib/lua/luci/controller/locale.lua in uhttpd.

Data is provided by the National Vulnerability Database (NVD)
Tp-linkTl-wvr300 Firmware Version-
   Tp-linkTl-wvr300 Version-
Tp-linkTl-wvr302 Firmware Version-
   Tp-linkTl-wvr302 Version-
Tp-linkTl-wvr450 Firmware Version-
   Tp-linkTl-wvr450 Version-
Tp-linkTl-wvr450l Firmware Version-
   Tp-linkTl-wvr450l Version-
Tp-linkTl-wvr450g Firmware Version-
   Tp-linkTl-wvr450g Version-
Tp-linkTl-wvr458 Firmware Version-
   Tp-linkTl-wvr458 Version-
Tp-linkTl-wvr458l Firmware Version-
   Tp-linkTl-wvr458l Version-
Tp-linkTl-wvr458p Firmware Version-
   Tp-linkTl-wvr458p Version-
Tp-linkTl-wvr900g Firmware Version-
   Tp-linkTl-wvr900g Version-
Tp-linkTl-wvr900l Firmware Version-
   Tp-linkTl-wvr900l Version-
Tp-linkTl-wvr1200l Firmware Version-
   Tp-linkTl-wvr1200l Version-
Tp-linkTl-wvr1300l Firmware Version-
   Tp-linkTl-wvr1300l Version-
Tp-linkTl-wvr1300g Firmware Version-
   Tp-linkTl-war1300g Version-
Tp-linkTl-wvr1750l Firmware Version-
   Tp-linkTl-wvr1750l Version-
Tp-linkTl-war2600l Firmware Version-
   Tp-linkTl-wvr2600l Version-
Tp-linkTl-wvr4300l Firmware Version-
   Tp-linkTl-wvr4300l Version-
Tp-linkTl-war302 Firmware Version-
   Tp-linkTl-war302 Version-
Tp-linkTl-war450 Firmware Version-
   Tp-linkTl-war450 Version-
Tp-linkTl-war450l Firmware Version-
   Tp-linkTl-war450l Version-
Tp-linkTl-war458 Firmware Version-
   Tp-linkTl-war458 Version-
Tp-linkTl-war458l Firmware Version-
   Tp-linkTl-war458l Version-
Tp-linkTl-war900l Firmware Version-
   Tp-linkTl-war900l Version-
Tp-linkTl-war1200l Firmware Version-
   Tp-linkTl-war1200l Version-
Tp-linkTl-war1300l Firmware Version-
   Tp-linkTl-war1300l Version-
Tp-linkTl-war1750l Firmware Version-
   Tp-linkTl-war1750l Version-
Tp-linkTl-war2600l Firmware Version-
   Tp-linkTl-war2600l Version-
Tp-linkTl-er3210g Firmware Version-
   Tp-linkTl-er3210g Version-
Tp-linkTl-er3220g Firmware Version-
   Tp-linkTl-er3220g Version-
Tp-linkTl-er5110g Firmware Version-
   Tp-linkTl-er5110g Version-
Tp-linkTl-er5120g Firmware Version-
   Tp-linkTl-er5120g Version-
Tp-linkTl-er5510g Firmware Version-
   Tp-linkTl-er5510g Version-
Tp-linkTl-er5520g Firmware Version-
   Tp-linkTl-er5520g Version-
Tp-linkTl-er6110g Firmware Version-
   Tp-linkTl-er6110g Version-
Tp-linkTl-er6120g Firmware Version-
   Tp-linkTl-er6120g Version-
Tp-linkTl-er6220g Firmware Version-
   Tp-linkTl-er6220g Version-
Tp-linkTl-er6510g Firmware Version-
   Tp-linkTl-er6510g Version-
Tp-linkTl-er6520g Firmware Version-
   Tp-linkTl-er6520g Version-
Tp-linkTl-er7520g Firmware Version-
   Tp-linkTl-er7520g Version-
Tp-linkTl-r473 Firmware Version-
   Tp-linkTl-r473 Version-
Tp-linkTl-r473g Firmware Version-
   Tp-linkTl-r473g Version-
Tp-linkTl-r473p-ac Firmware Version-
   Tp-linkTl-r473p-ac Version-
Tp-linkTl-r479gp-ac Firmware Version-
   Tp-linkTl-r473gp-ac Version-
Tp-linkTl-r478 Firmware Version-
   Tp-linkTl-r478 Version-
Tp-linkTl-r478g Firmware Version-
   Tp-linkTl-r478g Version-
Tp-linkTl-r479p-ac Firmware Version-
   Tp-linkTl-r479p-ac Version-
Tp-linkTl-r479gp-ac Firmware Version-
   Tp-linkTl-r479gp-ac Version-
Tp-linkTl-r479gpe-ac Firmware Version-
   Tp-linkTl-r479gpe-ac Version-
Tp-linkTl-r483 Firmware Version-
   Tp-linkTl-r483 Version-
Tp-linkTl-r483g Firmware Version-
   Tp-linkTl-r483g Version-
Tp-linkTl-r488 Firmware Version-
   Tp-linkTl-r488 Version-
Tp-linkTl-r4149g Firmware Version-
   Tp-linkTl-r4149g Version-
Tp-linkTl-r4239g Firmware Version-
   Tp-linkTl-r4239g Version-
Tp-linkTl-r4299g Firmware Version-
   Tp-linkTl-r4299g Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.38% 0.585
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
nvd@nist.gov 4 8 2.9
AV:N/AC:L/Au:S/C:P/I:N/A:N
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.