Command Injection Vulnerability in TP-Link Networking Devices
CVE-2017-15615
7.2HIGH
Summary
This security vulnerability in TP-Link networking devices including WVR, WAR, and ER models enables authenticated remote administrators to exploit improper validation of input in the 'lcpechointerval' variable in the 'pptp_client.lua' file. This flaw permits the execution of arbitrary commands, posing severe risks to device integrity and network security. It is crucial for users and administrators of TP-Link products to apply relevant security measures and updates to mitigate potential attacks.
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved