Lucene search

K
nvd[email protected]NVD:CVE-2020-35576
HistoryJan 26, 2021 - 6:15 p.m.

CVE-2020-35576

2021-01-2618:15:54
CWE-78
web.nvd.nist.gov
3
command injection
tp-link
tl-wr841n
firmware
vulnerability
authenticated users
arbitrary code
root access
shell metacharacters
cve-2020-35576
cve-2018-12577

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9

Confidence

High

EPSS

0.007

Percentile

80.2%

A Command Injection issue in the traceroute feature on TP-Link TL-WR841N V13 (JP) with firmware versions prior to 201216 allows authenticated users to execute arbitrary code as root via shell metacharacters, a different vulnerability than CVE-2018-12577.

Affected configurations

Nvd
Node
tp-linktl-wr841n_firmwareRange<201216
AND
tp-linktl-wr841nMatchv13
VendorProductVersionCPE
tp-linktl-wr841n_firmware*cpe:2.3:o:tp-link:tl-wr841n_firmware:*:*:*:*:*:*:*:*
tp-linktl-wr841nv13cpe:2.3:h:tp-link:tl-wr841n:v13:*:*:*:*:*:*:*

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9

Confidence

High

EPSS

0.007

Percentile

80.2%