Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-11481


TP-LINK IPC TL-IPC223(P)-6, TL-IPC323K-D, TL-IPC325(KP)-*, and TL-IPC40A-4 devices allow authenticated remote code execution via crafted JSON data because /usr/lib/lua/luci/torchlight/validator.lua does not block various punctuation characters.


Published

2018-05-30T21:29:00.580

Last Modified

2024-11-21T03:43:27.417

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 8.8 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System tp-link ipc_tl-ipc223\(p\)-6_firmware < 1.0.21 Yes
Hardware tp-link ipc_tl-ipc223\(p\)-6 - No
Operating System tp-link tl-ipc323k-d_firmware < 1.0.21 Yes
Hardware tp-link tl-ipc323k-d - No
Operating System tp-link tl-ipc325\(kp\)_firmware < 1.0.21 Yes
Hardware tp-link tl-ipc325\(kp\) - No
Operating System tp-link tl-ipc40a-4_firmware < 1.0.21 Yes
Hardware tp-link tl-ipc40a-4 - No

References