Description
TP-LINK IPC TL-IPC223(P)-6, TL-IPC323K-D, TL-IPC325(KP)-*, and TL-IPC40A-4 devices allow authenticated remote code execution via crafted JSON data because /usr/lib/lua/luci/torchlight/validator.lua does not block various punctuation characters.
Published: 2018-05-30
Score: 8.8 High
EPSS: 1.7% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2018-3512 TP-LINK IPC TL-IPC223(P)-6, TL-IPC323K-D, TL-IPC325(KP)-*, and TL-IPC40A-4 devices allow authenticated remote code execution via crafted JSON data because /usr/lib/lua/luci/torchlight/validator.lua does not block various punctuation characters.
History

No history.

Subscriptions

Tp-link Ipc Tl-ipc223\(p\)-6 Ipc Tl-ipc223\(p\)-6 Firmware Tl-ipc323k-d Tl-ipc323k-d Firmware Tl-ipc325\(kp\) Tl-ipc325\(kp\) Firmware Tl-ipc40a-4 Tl-ipc40a-4 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T08:10:14.807Z

Reserved: 2018-05-25T00:00:00.000Z

Link: CVE-2018-11481

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-05-30T21:29:00.580

Modified: 2024-11-21T03:43:27.417

Link: CVE-2018-11481

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses