Command Injection Vulnerability in TP-Link Networking Devices
CVE-2017-15613
7.2HIGH
Summary
TP-Link WVR, WAR, and ER series devices have a vulnerability that allows authenticated remote administrators to execute arbitrary commands through a command injection flaw in the 'new-interface' variable located in the cmxddns.lua file. This could lead to unauthorized actions on the devices, putting network integrity at risk. Proper validation of the input in the specified file is crucial for securing the device against malicious exploitation.
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved