Command Injection in TP-Link Devices Allows Arbitrary Command Execution
CVE-2017-15614
7.2HIGH
Summary
TP-Link WVR, WAR, and ER devices are susceptible to a command injection vulnerability that can potentially allow authenticated administrators to execute arbitrary commands. This vulnerability arises from improper handling of the 'new-outif' variable in the pptp_client.lua file, posing a risk to device security and operational integrity. Administrators are urged to apply relevant patches and updates to safeguard their systems.
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved