TP-Link TL-WPA4530 KIT V2 (EU)_170406 and V2 (EU)_161115 is vulnerable to Command Injection via _httpRpmPlcDeviceRemove.
References
Link | Resource |
---|---|
https://github.com/FirmRec/IoT-Vulns/blob/main/tp-link/postPlcJson/report.md | Exploit Third Party Advisory |
https://github.com/FirmRec/IoT-Vulns/blob/main/tp-link/postPlcJson/report.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/FirmRec/IoT-Vulns/blob/main/tp-link/postPlcJson/report.md - Exploit, Third Party Advisory |
Information
Published : 2023-05-17 14:15
Updated : 2024-11-21 08:02
NVD link : CVE-2023-31701
Mitre link : CVE-2023-31701
CVE.ORG link : CVE-2023-31701
JSON object : View
Products Affected
tp-link
- tl-wpa4530_kit
- tl-wpa4530_kit_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')