
CVE-2017-15613 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15613
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-interface variable in the cmxddns.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable new-interface en el archivo cmxddns.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •

CVE-2017-15614 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15614
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-outif variable in the pptp_client.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable new-outif en el archivo pptp_client.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •

CVE-2017-15615 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15615
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the lcpechointerval variable in the pptp_client.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable lcpechointerval en el archivo pptp_client.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •

CVE-2017-15616 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15616
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-interface variable in the phddns.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable new-interface en el archivo phddns.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •

CVE-2017-15617 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15617
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the iface variable in the interface_wan.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable iface en el archivo interface_wan.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •

CVE-2017-15618 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15618
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-enable variable in the pptp_client.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable new-enable en el archivo pptp_client.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •

CVE-2017-15619 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15619
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the pptphellointerval variable in the pptp_client.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable pptphellointerval en el archivo pptp_client.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •

CVE-2017-15620 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15620
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-zone variable in the ipmac_import.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable new-zone en el archivo ipmac_import.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •

CVE-2017-15621 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15621
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the olmode variable in the interface_wan.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable olmode en el archivo interface_wan.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •

CVE-2017-15622 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15622
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-mppeencryption variable in the pptp_client.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable new-mppeencryption en el archivo pptp_client.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •