Remote Command Execution Vulnerability in TP-Link Networking Devices
CVE-2017-16958
8.8HIGH
Summary
A vulnerability exists in various TP-Link networking devices that allows remote authenticated users to execute arbitrary commands. This is achieved through manipulation of shell metacharacters in the t_bindif field within an admin/bridge command to cgi-bin/luci. The issue is tied to the get_device_byif function found in /usr/lib/lua/luci/controller/admin/bridge.lua, which does not properly validate input, enabling exploitation by unauthorized commands.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved