Vulnerability Description
TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow DoSing the HTTP server via a crafted Cookie header to the /cgi/ansi URI.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | C2 Firmware | <= 0.9.1_4.2_v0032.0_build_160706 |
| Tp-Link | C2 | - |
| Tp-Link | C20I Firmware | <= 0.9.1_4.2_v0032.0_build_160706 |
| Tp-Link | C20I | - |
Related Weaknesses (CWE)
References
- https://pierrekim.github.io/blog/2017-02-09-tplink-c2-and-c20i-vulnerable.htmlExploitTechnical DescriptionThird Party Advisory
- https://pierrekim.github.io/blog/2017-02-09-tplink-c2-and-c20i-vulnerable.htmlExploitTechnical DescriptionThird Party Advisory
FAQ
What is CVE-2017-8219?
CVE-2017-8219 is a vulnerability with a CVSS score of 6.5 (MEDIUM). TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow DoSing the HTTP server via a crafted Cookie header to the /cgi/ansi URI.
How severe is CVE-2017-8219?
CVE-2017-8219 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-8219?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link C2 Firmware, Tp-Link C2, Tp-Link C20I Firmware, Tp-Link C20I.