var-201801-0394
Vulnerability from variot
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-interface variable in the cmxddns.lua file. TP-LinkWVR, WAR and ERdevices are different series of router products from China TP-LINK. Security vulnerabilities exist in TP-LinkWVR, WAR, and ER devices
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201801-0394", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "er", scope: null, trust: 2.4, vendor: "tp link", version: null, }, { model: "wvr", scope: null, trust: 2.4, vendor: "tp link", version: null, }, { model: "war", scope: null, trust: 2.4, vendor: "tp link", version: null, }, { model: "wvr900l", scope: "eq", trust: 1.6, vendor: "tp link", version: null, }, { model: "wvr900g", scope: "eq", trust: 1.6, vendor: "tp link", version: "3.0_170306", }, { model: "wvr4300l", scope: "eq", trust: 1.6, vendor: "tp link", version: null, }, { model: "wvr2600l", scope: "eq", trust: 1.6, vendor: "tp link", version: null, }, { model: "wvr450l", scope: "eq", trust: 1.6, vendor: "tp link", version: "1.0161125", }, { model: "wvr450", scope: "eq", trust: 1.6, vendor: "tp link", version: null, }, { model: "wvr300", scope: "eq", trust: 1.6, vendor: "tp link", version: null, }, { model: "wvr458l", scope: "eq", trust: 1.6, vendor: "tp link", version: null, }, { model: "wvr1750l", scope: "eq", trust: 1.6, vendor: "tp link", version: null, }, { model: "wvr302", scope: "eq", trust: 1.6, vendor: "tp link", version: null, }, { model: "r473g", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "r4149g", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "war1300l", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "war450l", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "r4239g", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "r478\\+", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "war458l", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "r478", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "er5120g", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "r473gp-ac", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "war302", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "war2600l", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "r4299g", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "war1750l", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "r488", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "r478g\\+", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "er5110g", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "r473", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "war900l", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "wvr1300g", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "r473p-ac", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "er5520g", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "r483g", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "war458", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "wvr1300l", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "r483", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "war450", scope: "eq", trust: 1, vendor: "tp link", version: null, }, { model: "er5510g", scope: "eq", trust: 1, vendor: "tp link", version: null, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-02034", }, { db: "CNVD", id: "CNVD-2018-01916", }, { db: "CNVD", id: "CNVD-2018-02027", }, { db: "CNVD", id: "CNVD-2018-02037", }, { db: "CNNVD", id: "CNNVD-201801-431", }, { db: "NVD", id: "CVE-2017-15613", }, ], }, cve: "CVE-2017-15613", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "nvd@nist.gov", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", exploitabilityScore: 8, id: "CVE-2017-15613", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 1, vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", exploitabilityScore: 8, id: "CNVD-2018-02034", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.6, vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", exploitabilityScore: 8, id: "CNVD-2018-01916", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.6, vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", exploitabilityScore: 8, id: "CNVD-2018-02027", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.6, vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", exploitabilityScore: 8, id: "CNVD-2018-02037", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.6, vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", exploitabilityScore: 8, id: "VHN-106470", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:S/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", exploitabilityScore: 8, id: "VHN-106476", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:S/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", exploitabilityScore: 8, id: "VHN-106477", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:S/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", exploitabilityScore: 8, id: "VHN-106453", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:S/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", exploitabilityScore: 8, id: "VHN-106454", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:S/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", exploitabilityScore: 8, id: "VHN-106459", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:S/C:C/I:C/A:C", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", exploitabilityScore: 8, id: "VHN-106465", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:S/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "nvd@nist.gov", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 1.2, id: "CVE-2017-15613", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2017-15613", trust: 1, value: "HIGH", }, { author: "CNVD", id: "CNVD-2018-02034", trust: 0.6, value: "HIGH", }, { author: "CNVD", id: "CNVD-2018-01916", trust: 0.6, value: "HIGH", }, { author: "CNVD", id: "CNVD-2018-02027", trust: 0.6, value: "HIGH", }, { author: "CNVD", id: "CNVD-2018-02037", trust: 0.6, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-201801-431", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-106470", trust: 0.1, value: "HIGH", }, { author: "VULHUB", id: "VHN-106476", trust: 0.1, value: "HIGH", }, { author: "VULHUB", id: "VHN-106477", trust: 0.1, value: "HIGH", }, { author: "VULHUB", id: "VHN-106453", trust: 0.1, value: "HIGH", }, { author: "VULHUB", id: "VHN-106454", trust: 0.1, value: "HIGH", }, { author: "VULHUB", id: "VHN-106459", trust: 0.1, value: "HIGH", }, { author: "VULHUB", id: "VHN-106465", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2018-02034", }, { db: "CNVD", id: "CNVD-2018-01916", }, { db: "CNVD", id: "CNVD-2018-02027", }, { db: "CNVD", id: "CNVD-2018-02037", }, { db: "VULHUB", id: "VHN-106470", }, { db: "VULHUB", id: "VHN-106476", }, { db: "VULHUB", id: "VHN-106477", }, { db: "VULHUB", id: "VHN-106453", }, { db: "VULHUB", id: "VHN-106454", }, { db: "VULHUB", id: "VHN-106459", }, { db: "VULHUB", id: "VHN-106465", }, { db: "CNNVD", id: "CNNVD-201801-431", }, { db: "NVD", id: "CVE-2017-15613", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-interface variable in the cmxddns.lua file. TP-LinkWVR, WAR and ERdevices are different series of router products from China TP-LINK. Security vulnerabilities exist in TP-LinkWVR, WAR, and ER devices", sources: [ { db: "NVD", id: "CVE-2017-15613", }, { db: "CNVD", id: "CNVD-2018-02034", }, { db: "CNVD", id: "CNVD-2018-01916", }, { db: "CNVD", id: "CNVD-2018-02027", }, { db: "CNVD", id: "CNVD-2018-02037", }, { db: "VULHUB", id: "VHN-106470", }, { db: "VULHUB", id: "VHN-106476", }, { db: "VULHUB", id: "VHN-106477", }, { db: "VULHUB", id: "VHN-106453", }, { db: "VULHUB", id: "VHN-106454", }, { db: "VULHUB", id: "VHN-106459", }, { db: "VULHUB", id: "VHN-106465", }, ], trust: 3.69, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2017-15613", trust: 4.7, }, { db: "CNNVD", id: "CNNVD-201801-431", trust: 0.7, }, { db: "CNVD", id: "CNVD-2018-02034", trust: 0.6, }, { db: "CNVD", id: "CNVD-2018-01916", trust: 0.6, }, { db: "CNVD", id: "CNVD-2018-02027", trust: 0.6, }, { db: "CNVD", id: "CNVD-2018-02037", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-201710-902", trust: 0.1, }, { db: "VULHUB", id: "VHN-106470", trust: 0.1, }, { db: "CNNVD", id: "CNNVD-201710-897", trust: 0.1, }, { db: "VULHUB", id: "VHN-106476", trust: 0.1, }, { db: "CNNVD", id: "CNNVD-201710-896", trust: 0.1, }, { db: "VULHUB", id: "VHN-106477", trust: 0.1, }, { db: "PACKETSTORM", id: "145823", trust: 0.1, }, { db: "VULHUB", id: "VHN-106453", trust: 0.1, }, { db: "CNNVD", id: "CNNVD-201801-430", trust: 0.1, }, { db: "VULHUB", id: "VHN-106454", trust: 0.1, }, { db: "CNNVD", id: "CNNVD-201801-425", trust: 0.1, }, { db: "VULHUB", id: "VHN-106459", trust: 0.1, }, { db: "CNNVD", id: "CNNVD-201710-907", trust: 0.1, }, { db: "VULHUB", id: "VHN-106465", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-02034", }, { db: "CNVD", id: "CNVD-2018-01916", }, { db: "CNVD", id: "CNVD-2018-02027", }, { db: "CNVD", id: "CNVD-2018-02037", }, { db: "VULHUB", id: "VHN-106470", }, { db: "VULHUB", id: "VHN-106476", }, { db: "VULHUB", id: "VHN-106477", }, { db: "VULHUB", id: "VHN-106453", }, { db: "VULHUB", id: "VHN-106454", }, { db: "VULHUB", id: "VHN-106459", }, { db: "VULHUB", id: "VHN-106465", }, { db: "CNNVD", id: "CNNVD-201801-431", }, { db: "NVD", id: "CVE-2017-15613", }, ], }, id: "VAR-201801-0394", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2018-02034", }, { db: "CNVD", id: "CNVD-2018-01916", }, { db: "CNVD", id: "CNVD-2018-02027", }, { db: "CNVD", id: "CNVD-2018-02037", }, { db: "VULHUB", id: "VHN-106470", }, { db: "VULHUB", id: "VHN-106476", }, { db: "VULHUB", id: "VHN-106477", }, { db: "VULHUB", id: "VHN-106453", }, { db: "VULHUB", id: "VHN-106454", }, { db: "VULHUB", id: "VHN-106459", }, { db: "VULHUB", id: "VHN-106465", }, ], trust: 3.6992440799999997, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 2.4, }, ], sources: [ { db: "CNVD", id: "CNVD-2018-02034", }, { db: "CNVD", id: "CNVD-2018-01916", }, { db: "CNVD", id: "CNVD-2018-02027", }, { db: "CNVD", id: "CNVD-2018-02037", }, ], }, last_update_date: "2024-11-29T22:41:34.504000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Patch for TP-LinkWVR, WAR, and ER device arbitrary command execution vulnerability (CNVD-2018-02034)", trust: 0.6, url: "https://www.cnvd.org.cn/patchInfo/show/114579", }, { title: "TP-LinkWVR, WAR, and ER device arbitrary command execution vulnerability patch", trust: 0.6, url: "https://www.cnvd.org.cn/patchInfo/show/114425", }, { title: "Patch for TP-LinkWVR, WAR, and ER device arbitrary command execution vulnerability (CNVD-2018-02027)", trust: 0.6, url: "https://www.cnvd.org.cn/patchInfo/show/114565", }, { title: "Patch for TP-LinkWVR, WAR, and ER Device Arbitrary Command Execution Vulnerability (CNVD-2018-02037)", trust: 0.6, url: "https://www.cnvd.org.cn/patchInfo/show/114585", }, { title: "TP-Link WVR , WAR and ER Repair measures for device security vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=77685", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-02034", }, { db: "CNVD", id: "CNVD-2018-01916", }, { db: "CNVD", id: "CNVD-2018-02027", }, { db: "CNVD", id: "CNVD-2018-02037", }, { db: "CNNVD", id: "CNNVD-201801-431", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "NVD-CWE-noinfo", trust: 1, }, { problemtype: "CWE-77", trust: 0.7, }, ], sources: [ { db: "VULHUB", id: "VHN-106470", }, { db: "VULHUB", id: "VHN-106476", }, { db: "VULHUB", id: "VHN-106477", }, { db: "VULHUB", id: "VHN-106453", }, { db: "VULHUB", id: "VHN-106454", }, { db: "VULHUB", id: "VHN-106459", }, { db: "VULHUB", id: "VHN-106465", }, { db: "NVD", id: "CVE-2017-15613", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 4.1, url: "https://github.com/chunibalon/vulnerability/blob/master/cve-2017-15613_to_cve-2017-15637.txt", }, { trust: 2.3, url: "http://www.securityfocus.com/archive/1/541655/100/0/threaded", }, { trust: 1.8, url: "http://www.securityfocus.com/archive/1/archive/1/541655/100/0/threaded", }, { trust: 0.6, url: "http://seclists.org/bugtraq/2018/jan/31", }, ], sources: [ { db: "CNVD", id: "CNVD-2018-02034", }, { db: "CNVD", id: "CNVD-2018-01916", }, { db: "CNVD", id: "CNVD-2018-02027", }, { db: "CNVD", id: "CNVD-2018-02037", }, { db: "VULHUB", id: "VHN-106470", }, { db: "VULHUB", id: "VHN-106476", }, { db: "VULHUB", id: "VHN-106477", }, { db: "VULHUB", id: "VHN-106453", }, { db: "VULHUB", id: "VHN-106454", }, { db: "VULHUB", id: "VHN-106459", }, { db: "VULHUB", id: "VHN-106465", }, { db: "CNNVD", id: "CNNVD-201801-431", }, { db: "NVD", id: "CVE-2017-15613", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2018-02034", }, { db: "CNVD", id: "CNVD-2018-01916", }, { db: "CNVD", id: "CNVD-2018-02027", }, { db: "CNVD", id: "CNVD-2018-02037", }, { db: "VULHUB", id: "VHN-106470", }, { db: "VULHUB", id: "VHN-106476", }, { db: "VULHUB", id: "VHN-106477", }, { db: "VULHUB", id: "VHN-106453", }, { db: "VULHUB", id: "VHN-106454", }, { db: "VULHUB", id: "VHN-106459", }, { db: "VULHUB", id: "VHN-106465", }, { db: "CNNVD", id: "CNNVD-201801-431", }, { db: "NVD", id: "CVE-2017-15613", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-01-26T00:00:00", db: "CNVD", id: "CNVD-2018-02034", }, { date: "2018-01-12T00:00:00", db: "CNVD", id: "CNVD-2018-01916", }, { date: "2018-01-26T00:00:00", db: "CNVD", id: "CNVD-2018-02027", }, { date: "2018-01-12T00:00:00", db: "CNVD", id: "CNVD-2018-02037", }, { date: "2018-01-11T00:00:00", db: "VULHUB", id: "VHN-106470", }, { date: "2018-01-11T00:00:00", db: "VULHUB", id: "VHN-106476", }, { date: "2018-01-11T00:00:00", db: "VULHUB", id: "VHN-106477", }, { date: "2018-01-11T00:00:00", db: "VULHUB", id: "VHN-106453", }, { date: "2018-01-11T00:00:00", db: "VULHUB", id: "VHN-106454", }, { date: "2018-01-11T00:00:00", db: "VULHUB", id: "VHN-106459", }, { date: "2018-01-11T00:00:00", db: "VULHUB", id: "VHN-106465", }, { date: "2018-01-12T00:00:00", db: "CNNVD", id: "CNNVD-201801-431", }, { date: "2018-01-11T16:29:00.407000", db: "NVD", id: "CVE-2017-15613", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2018-01-26T00:00:00", db: "CNVD", id: "CNVD-2018-02034", }, { date: "2018-01-25T00:00:00", db: "CNVD", id: "CNVD-2018-01916", }, { date: "2018-01-26T00:00:00", db: "CNVD", id: "CNVD-2018-02027", }, { date: "2018-01-26T00:00:00", db: "CNVD", id: "CNVD-2018-02037", }, { date: "2019-10-03T00:00:00", db: "VULHUB", id: "VHN-106470", }, { date: "2019-10-03T00:00:00", db: "VULHUB", id: "VHN-106476", }, { date: "2019-10-03T00:00:00", db: "VULHUB", id: "VHN-106477", }, { date: "2019-10-03T00:00:00", db: "VULHUB", id: "VHN-106453", }, { date: "2019-10-03T00:00:00", db: "VULHUB", id: "VHN-106454", }, { date: "2019-10-03T00:00:00", db: "VULHUB", id: "VHN-106459", }, { date: "2019-10-03T00:00:00", db: "VULHUB", id: "VHN-106465", }, { date: "2019-10-23T00:00:00", db: "CNNVD", id: "CNNVD-201801-431", }, { date: "2024-11-21T03:14:51.303000", db: "NVD", id: "CVE-2017-15613", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201801-431", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "TP-Link WVR, WAR, and ER Device Arbitrary Command Execution Vulnerabilities (CNVD-2018-02034)", sources: [ { db: "CNVD", id: "CNVD-2018-02034", }, ], trust: 0.6, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "command injection", sources: [ { db: "CNNVD", id: "CNNVD-201801-431", }, ], trust: 0.6, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.