Vulnerability Details : CVE-2017-16957
Potential exploit
TP-Link TL-WVR, TL-WAR, TL-ER, and TL-R devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the iface field of an admin/diagnostic command to cgi-bin/luci, related to the zone_get_effect_devices function in /usr/lib/lua/luci/controller/admin/diagnostic.lua in uhttpd.
Products affected by CVE-2017-16957
- cpe:2.3:o:tp-link:tl-wvr450_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr450l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr458_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr458l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr458p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr900l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr1200l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr1300l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr1300g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr1750l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr4300l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war302_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war450_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war450l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war458_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war458l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war900l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war1200l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war1300l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war1750l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war2600l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er3210g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er3220g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er5110g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er5120g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er6110g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er6220g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er6510g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er7520g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r473g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r473p-ac_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r478g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r479p-ac_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r479gp-ac_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r479gpe-ac_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r4149g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr300_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr302_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr450g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr900g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er5510g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er5520g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er6120g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er6520g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r473_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r478_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r478\+_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r478g\+_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r483_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r483g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r488_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r4239g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r4299g_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-16957
3.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-16957
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2017-16957
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-16957
-
http://www.securityfocus.com/bid/101968
Multiple TP-Link Routers CVE-2017-16957 Command Injection VulnerabilityThird Party Advisory;VDB Entry
-
https://github.com/coincoin7/Wireless-Router-Vulnerability/blob/master/TplinkDiagnosticAuthenticatedRCE.txt
Wireless-Router-Vulnerability/TplinkDiagnosticAuthenticatedRCE.txt at master · coincoin7/Wireless-Router-Vulnerability · GitHubExploit;Third Party Advisory
Jump to