CVE-2017-8219

TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow DoSing the HTTP server via a crafted Cookie header to the /cgi/ansi URI.
References
Link Resource
https://pierrekim.github.io/blog/2017-02-09-tplink-c2-and-c20i-vulnerable.html Exploit Technical Description Third Party Advisory
https://pierrekim.github.io/blog/2017-02-09-tplink-c2-and-c20i-vulnerable.html Exploit Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:c2_firmware:*:rel.37961n:*:*:*:*:*:*
cpe:2.3:h:tp-link:c2:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:tp-link:c20i_firmware:*:rel.37961n:*:*:*:*:*:*
cpe:2.3:h:tp-link:c20i:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:33

Type Values Removed Values Added
References () https://pierrekim.github.io/blog/2017-02-09-tplink-c2-and-c20i-vulnerable.html - Exploit, Technical Description, Third Party Advisory () https://pierrekim.github.io/blog/2017-02-09-tplink-c2-and-c20i-vulnerable.html - Exploit, Technical Description, Third Party Advisory

Information

Published : 2017-04-25 20:59

Updated : 2024-11-21 03:33


NVD link : CVE-2017-8219

Mitre link : CVE-2017-8219

CVE.ORG link : CVE-2017-8219


JSON object : View

Products Affected

tp-link

  • c20i_firmware
  • c2
  • c20i
  • c2_firmware
CWE
CWE-20

Improper Input Validation