Описание
TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow remote code execution with a single HTTP request by placing shell commands in a "host=" line within HTTP POST data.
Ссылки
- ExploitTechnical DescriptionThird Party Advisory
- ExploitTechnical DescriptionThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.9.1_4.2_v0032.0_build_160706 (включая)
Одновременно
cpe:2.3:o:tp-link:c2_firmware:*:rel.37961n:*:*:*:*:*:*
cpe:2.3:h:tp-link:c2:-:*:*:*:*:*:*:*
Конфигурация 2Версия до 0.9.1_4.2_v0032.0_build_160706 (включая)
Одновременно
cpe:2.3:o:tp-link:c20i_firmware:*:rel.37961n:*:*:*:*:*:*
cpe:2.3:h:tp-link:c20i:-:*:*:*:*:*:*:*
EPSS
Процентиль: 88%
0.03779
Низкий
9.9 Critical
CVSS3
9 Critical
CVSS2
Дефекты
CWE-78
Связанные уязвимости
CVSS3: 9.9
github
больше 3 лет назад
TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow remote code execution with a single HTTP request by placing shell commands in a "host=" line within HTTP POST data.
EPSS
Процентиль: 88%
0.03779
Низкий
9.9 Critical
CVSS3
9 Critical
CVSS2
Дефекты
CWE-78