ID CVE-2017-14250 Type cve Reporter NVD Modified 2017-11-22T12:06:11
Description
In TP-LINK TL-WR741N / TL-WR741ND 150M Wireless Lite N Router with Firmware Version 3.11.7 Build 100603 Rel.56412n and Hardware Version: WR741N v1/v2 00000000, parameter SSID in the "Wireless Settings" is not properly validated. It's possible to inject malicious code: </script><H1>BUG/* </script><a href=XXX.com>. The second payload blocks the change of wireless settings. A factory reset is required.
{"reporter": "NVD", "viewCount": 6, "enchantments": {"score": {"value": 7.5, "vector": "NONE"}, "dependencies": {"references": [], "modified": "2017-11-25T11:37:54"}, "vulnersScore": 7.5}, "hashmap": [{"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "4540baf50eec3a8a36890b065ad00c39", "key": "cpe"}, {"hash": "4d13f4723e2bc4f073f4e3ea1e4fa476", "key": "cvelist"}, {"hash": "b4c02b01e145dc1cccaabeb902422ace", "key": "cvss"}, {"hash": "700f512af29ac906b8d1787b322960de", "key": "description"}, {"hash": "ee86d3e099cda06dfb18194c446114ac", "key": "href"}, {"hash": "cfe1d3f962e9ce7ed7e435be891a24f5", "key": "modified"}, {"hash": "44318cf0c03f439bbc26f168a71b2422", "key": "published"}, {"hash": "c3ed6fd891f3d71e269c0a2f5309cd50", "key": "references"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "4a52202777376d1471537e742e64ec44", "key": "title"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}], "assessment": {"name": "", "system": "", "href": ""}, "type": "cve", "title": "CVE-2017-14250", "objectVersion": "1.3", "cvelist": ["CVE-2017-14250"], "bulletinFamily": "NVD", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:COMPLETE/"}, "references": ["https://angeloanatrella86.github.io/CVE-2017/"], "scanner": [], "modified": "2017-11-22T12:06:11", "description": "In TP-LINK TL-WR741N / TL-WR741ND 150M Wireless Lite N Router with Firmware Version 3.11.7 Build 100603 Rel.56412n and Hardware Version: WR741N v1/v2 00000000, parameter SSID in the \"Wireless Settings\" is not properly validated. It's possible to inject malicious code: </script><H1>BUG/* </script><a href=XXX.com>. The second payload blocks the change of wireless settings. A factory reset is required.", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14250", "edition": 2, "history": [{"edition": 1, "bulletin": {"reporter": "NVD", "history": [], "enchantments": {}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14250", "assessment": {"name": "", "system": "", "href": ""}, "viewCount": 0, "hash": "288f5ecc7c74be32833f23db042f56078c08448832b0db774cf3b44f26096886", "title": "CVE-2017-14250", "objectVersion": "1.3", "bulletinFamily": "NVD", "cvelist": ["CVE-2017-14250"], "cvss": {"score": 0.0, "vector": "NONE"}, "references": ["https://angeloanatrella86.github.io/CVE-2017/"], "type": "cve", "modified": "2017-10-31T14:29:00", "description": "In TP-LINK TL-WR741N / TL-WR741ND 150M Wireless Lite N Router with Firmware Version 3.11.7 Build 100603 Rel.56412n and Hardware Version: WR741N v1/v2 00000000, parameter SSID in the \"Wireless Settings\" is not properly validated. It's possible to inject malicious code: </script><H1>BUG/* </script><a href=XXX.com>. The second payload blocks the change of wireless settings. A factory reset is required.", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "c3ed6fd891f3d71e269c0a2f5309cd50", "key": "references"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "4d13f4723e2bc4f073f4e3ea1e4fa476", "key": "cvelist"}, {"hash": "4a52202777376d1471537e742e64ec44", "key": "title"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "44318cf0c03f439bbc26f168a71b2422", "key": "published"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "700f512af29ac906b8d1787b322960de", "key": "description"}, {"hash": "44318cf0c03f439bbc26f168a71b2422", "key": "modified"}, {"hash": "ee86d3e099cda06dfb18194c446114ac", "key": "href"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cpe"}], "edition": 1, "scanner": [], "id": "CVE-2017-14250", "cpe": [], "lastseen": "2017-11-01T10:52:41", "published": "2017-10-31T14:29:00"}, "lastseen": "2017-11-01T10:52:41", "differentElements": ["cvss", "modified", "cpe"]}], "id": "CVE-2017-14250", "cpe": ["cpe:/o:tp-link:tl-wr741n_firmware:3.11.7", "cpe:/o:tp-link:tl-wr741nd_firmware:3.11.7"], "lastseen": "2017-11-25T11:37:54", "hash": "39d3c59a81a3e0bd8583af27d305f78cc58258f85d90f09a83004a4f130a360a", "published": "2017-10-31T14:29:00"}