The web-based configuration interface of the TP-Link M7350 V3 with firmware before 190531 is affected by several post-authentication command injection vulnerabilities.
References
Link | Resource |
---|---|
https://www.pentestpartners.com/security-blog/cve-2019-12103-analysis-of-a-pre-auth-rce-on-the-tp-link-m7350-with-ghidra/ | Exploit Third Party Advisory |
https://www.tp-link.com/uk/support/download/m7350/v3/#Firmware | Patch Vendor Advisory |
https://www.pentestpartners.com/security-blog/cve-2019-12103-analysis-of-a-pre-auth-rce-on-the-tp-link-m7350-with-ghidra/ | Exploit Third Party Advisory |
https://www.tp-link.com/uk/support/download/m7350/v3/#Firmware | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.pentestpartners.com/security-blog/cve-2019-12103-analysis-of-a-pre-auth-rce-on-the-tp-link-m7350-with-ghidra/ - Exploit, Third Party Advisory | |
References | () https://www.tp-link.com/uk/support/download/m7350/v3/#Firmware - Patch, Vendor Advisory |
Information
Published : 2019-08-14 21:15
Updated : 2024-11-21 04:22
NVD link : CVE-2019-12104
Mitre link : CVE-2019-12104
CVE.ORG link : CVE-2019-12104
JSON object : View
Products Affected
tp-link
- m7350_firmware
- m7350
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')