CVE-2020-24297
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
18/11/2020
Last modified:
01/12/2020
Description
httpd on TP-Link TL-WPA4220 devices (versions 2 through 4) allows remote authenticated users to execute arbitrary OS commands by sending crafted POST requests to the endpoint /admin/powerline. Fixed version: TL-WPA4220(EU)_V4_201023
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
9.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:tp-link:tl-wpa4220_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:tp-link:tl-wpa4220:v2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:tp-link:tl-wpa4220_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:tp-link:tl-wpa4220:v3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:tp-link:tl-wpa4220_firmware:*:*:*:*:*:*:*:* | tl-wpa4220\(eu\)_v4_201023 (excluding) | |
| cpe:2.3:h:tp-link:tl-wpa4220:v4:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



