Command Injection Vulnerability in TP-Link WVR, WAR, and ER Products
CVE-2017-15636
7.2HIGH
Summary
TP-Link's WVR, WAR, and ER series devices present a significant security issue that allows remote authenticated administrators to execute arbitrary commands. This vulnerability occurs through a command injection in the new-time variable located within the webfilter.lua file. Attackers exploiting this vulnerability can gain unauthorized control over the affected devices, potentially compromising the integrity and security of network operations. It is crucial for users to apply necessary patches and updates to mitigate this risk.
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved