CVE-2018-12692

TP-Link TL-WA850RE Wi-Fi Range Extender with hardware version 5 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the wps_setup_pin parameter to /data/wps.setup.json.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tl-wa850re_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wa850re:5:*:*:*:*:*:*:*

History

21 Nov 2024, 03:45

Type Values Removed Values Added
References () https://medium.com/advisability/the-in-security-of-the-tp-link-technologies-tl-wa850re-wi-fi-range-extender-26db87a7a0cc - Exploit, Third Party Advisory () https://medium.com/advisability/the-in-security-of-the-tp-link-technologies-tl-wa850re-wi-fi-range-extender-26db87a7a0cc - Exploit, Third Party Advisory
References () https://www.exploit-db.com/exploits/44912/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/44912/ - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2018-06-23 21:29

Updated : 2024-11-21 03:45


NVD link : CVE-2018-12692

Mitre link : CVE-2018-12692

CVE.ORG link : CVE-2018-12692


JSON object : View

Products Affected

tp-link

  • tl-wa850re_firmware
  • tl-wa850re
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')