Command Injection Vulnerability in TP-Link Networking Devices
CVE-2017-15615

7.2HIGH

Key Information:

Vendor
Tp-link
Vendor
CVE Published:
11 January 2018

Summary

This security vulnerability in TP-Link networking devices including WVR, WAR, and ER models enables authenticated remote administrators to exploit improper validation of input in the 'lcpechointerval' variable in the 'pptp_client.lua' file. This flaw permits the execution of arbitrary commands, posing severe risks to device integrity and network security. It is crucial for users and administrators of TP-Link products to apply relevant security measures and updates to mitigate potential attacks.

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.