Page 5 of 29 results (0.010 seconds)

CVSS: 9.0EPSS: 0%CPEs: 76EXPL: 2

TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the iface variable in the interface_wan.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable iface en el archivo interface_wan.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • http://www.securityfocus.com/archive/1/541655/100/0/threaded https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt •

CVSS: 9.0EPSS: 0%CPEs: 76EXPL: 2

TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-mppeencryption variable in the pptp_server.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable new-mppeencryption en el archivo pptp_server.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • http://www.securityfocus.com/archive/1/541655/100/0/threaded https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt •

CVSS: 9.0EPSS: 0%CPEs: 76EXPL: 2

TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the olmode variable in the interface_wan.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable olmode en el archivo interface_wan.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • http://www.securityfocus.com/archive/1/541655/100/0/threaded https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt •

CVSS: 9.0EPSS: 0%CPEs: 76EXPL: 2

TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-authtype variable in the pptp_server.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable new-authtype en el archivo pptp_server.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • http://www.securityfocus.com/archive/1/541655/100/0/threaded https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt •

CVSS: 9.0EPSS: 0%CPEs: 76EXPL: 2

TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-time variable in the webfilter.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable new-time en el archivo webfilter.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • http://www.securityfocus.com/archive/1/541655/100/0/threaded https://github.com/chunibalon/Vulnerability/blob/master/CVE-2017-15613_to_CVE-2017-15637.txt •