Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Wireless MAC Filtering page in TP-LINK TL-MR3220 wireless routers allows remote attackers to inject arbitrary web script or HTML via the Description field.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Tl-Mr3220 Firmware | - |
| Tp-Link | Tl-Mr3220 | - |
Related Weaknesses (CWE)
References
- https://fireshellsecurity.team/assets/pdf/Router-TP-LINK-TL-MR3220-VulnerabilityExploitThird Party Advisory
- https://www.exploit-db.com/exploits/43023/ExploitThird Party AdvisoryVDB Entry
- https://fireshellsecurity.team/assets/pdf/Router-TP-LINK-TL-MR3220-VulnerabilityExploitThird Party Advisory
- https://www.exploit-db.com/exploits/43023/ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2017-15291?
CVE-2017-15291 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Cross-site scripting (XSS) vulnerability in the Wireless MAC Filtering page in TP-LINK TL-MR3220 wireless routers allows remote attackers to inject arbitrary web script or HTML via the Description fie...
How severe is CVE-2017-15291?
CVE-2017-15291 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-15291?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Tl-Mr3220 Firmware, Tp-Link Tl-Mr3220.