Vulnerability Details : CVE-2017-16959
The locale feature in cgi-bin/luci on TP-Link TL-WVR, TL-WAR, TL-ER, and TL-R devices allows remote authenticated users to test for the existence of arbitrary files by making an operation=write;locale=%0d request, and then making an operation=read request with a crafted Accept-Language HTTP header, related to the set_sysinfo and get_sysinfo functions in /usr/lib/lua/luci/controller/locale.lua in uhttpd.
Vulnerability category: Directory traversal
Products affected by CVE-2017-16959
- cpe:2.3:o:tp-link:tl-wvr450_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr450l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr458_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr458l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr458p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr900l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr1200l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr1300l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr1300g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr1750l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr4300l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war302_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war450_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war450l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war458_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war458l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war900l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war1200l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war1300l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war1750l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-war2600l_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er3210g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er3220g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er5110g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er5120g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er6110g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er6220g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er6510g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er7520g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r473g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r473p-ac_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r478g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r479p-ac_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r479gp-ac_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r479gpe-ac_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r4149g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr300_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr302_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr450g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-wvr900g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er5510g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er5520g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er6120g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-er6520g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r473_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r478_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r478\+_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r478g\+_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r483_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r483g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r488_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r4239g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:tl-r4299g_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-16959
2.29%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-16959
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2017-16959
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-16959
-
https://github.com/coincoin7/Wireless-Router-Vulnerability/blob/master/TplinkLocalePathDisclosure.txt
Wireless-Router-Vulnerability/TplinkLocalePathDisclosure.txt at master · coincoin7/Wireless-Router-Vulnerability · GitHubExploit;Third Party Advisory
Jump to