CVE-2018-11481
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
30/05/2018
Last modified:
05/07/2018
Description
TP-LINK IPC TL-IPC223(P)-6, TL-IPC323K-D, TL-IPC325(KP)-*, and TL-IPC40A-4 devices allow authenticated remote code execution via crafted JSON data because /usr/lib/lua/luci/torchlight/validator.lua does not block various punctuation characters.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:tp-link:ipc_tl-ipc223\(p\)-6_firmware:*:*:*:*:*:*:*:* | 1.0.21 (excluding) | |
| cpe:2.3:h:tp-link:ipc_tl-ipc223\(p\)-6:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:tp-link:tl-ipc323k-d_firmware:*:*:*:*:*:*:*:* | 1.0.21 (excluding) | |
| cpe:2.3:h:tp-link:tl-ipc323k-d:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:tp-link:tl-ipc325\(kp\)_firmware:*:*:*:*:*:*:*:* | 1.0.21 (excluding) | |
| cpe:2.3:h:tp-link:tl-ipc325\(kp\):-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:tp-link:tl-ipc40a-4_firmware:*:*:*:*:*:*:*:* | 1.0.21 (excluding) | |
| cpe:2.3:h:tp-link:tl-ipc40a-4:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



