Vulnerability Details : CVE-2017-16958
TP-Link TL-WVR, TL-WAR, TL-ER, and TL-R devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the t_bindif field of an admin/bridge command to cgi-bin/luci, related to the get_device_byif function in /usr/lib/lua/luci/controller/admin/bridge.lua in uhttpd.
Products affected by CVE-2017-16958
- cpe:2.3:o:tp-link:tl-wvr450_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr450l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr458_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr458l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr458p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr900l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr1200l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr1300l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr1300g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr1750l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr4300l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war302_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war450_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war450l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war458_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war458l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war900l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war1200l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war1300l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war1750l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war2600l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er3210g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er3220g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er5110g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er5120g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er6110g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er6220g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er6510g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er7520g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r473g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r473p-ac_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r478g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r479p-ac_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r479gp-ac_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r479gpe-ac_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r4149g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr300_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr302_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr450g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr900g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er5510g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er5520g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er6120g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er6520g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r473_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r478_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r478\+_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r478g\+_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r483_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r483g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r488_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r4239g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r4299g_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-16958
0.39%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 70 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-16958
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2017-16958
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-16958
-
https://github.com/coincoin7/Wireless-Router-Vulnerability/blob/master/TplinkBridgeAuthenticatedRCE.txt
Wireless-Router-Vulnerability/TplinkBridgeAuthenticatedRCE.txt at master · coincoin7/Wireless-Router-Vulnerability · GitHubExploit;Third Party Advisory
Jump to