CVE-2017-8220

TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow remote code execution with a single HTTP request by placing shell commands in a "host=" line within HTTP POST data.
References
Link Resource
https://pierrekim.github.io/blog/2017-02-09-tplink-c2-and-c20i-vulnerable.html Exploit Technical Description Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:c2_firmware:*:rel.37961n:*:*:*:*:*:*
cpe:2.3:h:tp-link:c2:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:tp-link:c20i_firmware:*:rel.37961n:*:*:*:*:*:*
cpe:2.3:h:tp-link:c20i:-:*:*:*:*:*:*:*

Information

Published : 2017-04-25 13:59

Updated : 2019-10-02 17:03


NVD link : CVE-2017-8220

Mitre link : CVE-2017-8220


JSON object : View

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Advertisement

dedicated server usa

Products Affected

tp-link

  • c2_firmware
  • c20i
  • c20i_firmware
  • c2