
CVE-2017-15621 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15621
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the olmode variable in the interface_wan.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable olmode en el archivo interface_wan.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •

CVE-2017-15634 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15634
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the name variable in the wportal.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable name en el archivo wportal.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •

CVE-2017-15617 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15617
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the iface variable in the interface_wan.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable iface en el archivo interface_wan.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •

CVE-2017-15620 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15620
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-zone variable in the ipmac_import.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable new-zone en el archivo ipmac_import.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •

CVE-2017-15614 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15614
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-outif variable in the pptp_client.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable new-outif en el archivo pptp_client.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •

CVE-2017-15630 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15630
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-remotesubnet variable in the pptp_client.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable new-remotesubnet en el archivo pptp_client.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •

CVE-2017-15625 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15625
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-olmode variable in the pptp_client.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable new-olmode en el archivo pptp_client.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •

CVE-2017-15623 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15623
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-enable variable in the pptp_server.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable new-enable en el archivo pptp_server.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •

CVE-2017-15628 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15628
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the lcpechointerval variable in the pptp_server.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable lcpechointerval en el archivo pptp_server.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •

CVE-2017-15636 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15636
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-time variable in the webfilter.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable new-time en el archivo webfilter.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •