Command Injection Vulnerability in TP-Link Networking Devices
CVE-2017-15633
7.2HIGH
Summary
The identified vulnerability in TP-Link networking devices enables remote authenticated administrators to perform arbitrary command execution through command injection in the new-ipgroup variable located in the session_limits.lua file. This flaw could lead to unauthorized actions being executed on the device, potentially compromising the security and integrity of the affected systems. Users of the WVR, WAR, and ER series should assess their exposure to this vulnerability and apply necessary updates to mitigate risks.
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved