ID

VAR-201704-1317


CVE

CVE-2017-8220


TITLE

TP-Link C2 and C20i Command injection vulnerability in device firmware

Trust: 0.8

sources: JVNDB: JVNDB-2017-003639

DESCRIPTION

TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow remote code execution with a single HTTP request by placing shell commands in a "host=" line within HTTP POST data. TP-Link C2 and C20i The device firmware contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. TP-LINKC2 and C20i are all wireless router products of China TP-LINK. The TP-LinkC2 and C20i'Diagnostic' pages have security vulnerabilities that allow remote attackers to exploit this vulnerability to submit special requests to execute arbitrary code. TP-Link C2 and C20i with 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n and earlier firmware have security vulnerabilities

Trust: 2.34

sources: NVD: CVE-2017-8220 // JVNDB: JVNDB-2017-003639 // CNVD: CNVD-2017-06905 // VULHUB: VHN-116423 // VULMON: CVE-2017-8220

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-06905

AFFECTED PRODUCTS

vendor:tp linkmodel:c20iscope:lteversion:0.9.1_4.2_v0032.0_build_160706

Trust: 1.0

vendor:tp linkmodel:c2scope:lteversion:0.9.1_4.2_v0032.0_build_160706

Trust: 1.0

vendor:tp linkmodel:c2scope:lteversion:0.9.1 4.2 v0032.0 build 160706 rel.37961n

Trust: 0.8

vendor:tp linkmodel:c20iscope:lteversion:0.9.1 4.2 v0032.0 build 160706 rel.37961n

Trust: 0.8

vendor:tp linkmodel:c2 build rel.37961nscope:lteversion:<=0.9.14.2v0032.0160706

Trust: 0.6

vendor:tp linkmodel:c20i build rel.37961nscope:lteversion:<=0.9.14.2v0032.0160706

Trust: 0.6

vendor:tp linkmodel:c2scope:eqversion:0.9.1_4.2_v0032.0_build_160706

Trust: 0.6

vendor:tp linkmodel:c20iscope:eqversion:0.9.1_4.2_v0032.0_build_160706

Trust: 0.6

sources: CNVD: CNVD-2017-06905 // JVNDB: JVNDB-2017-003639 // CNNVD: CNNVD-201704-1458 // NVD: CVE-2017-8220

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-8220
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-8220
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2017-06905
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201704-1458
value: CRITICAL

Trust: 0.6

VULHUB: VHN-116423
value: HIGH

Trust: 0.1

VULMON: CVE-2017-8220
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-8220
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2017-06905
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-116423
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-8220
baseSeverity: CRITICAL
baseScore: 9.9
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.1
impactScore: 6.0
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-06905 // VULHUB: VHN-116423 // VULMON: CVE-2017-8220 // JVNDB: JVNDB-2017-003639 // CNNVD: CNNVD-201704-1458 // NVD: CVE-2017-8220

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.1

problemtype:CWE-77

Trust: 0.9

sources: VULHUB: VHN-116423 // JVNDB: JVNDB-2017-003639 // NVD: CVE-2017-8220

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201704-1458

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201704-1458

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-003639

PATCH

title:Details - CVE-2017-8220 - RCE with a single HTTP requesturl:https://pierrekim.github.io/blog/2017-02-09-tplink-c2-and-c20i-vulnerable.html

Trust: 0.8

title:Patch for TP-LINKC2 and C20i arbitrary code execution vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/93755

Trust: 0.6

title:Exploit-Collectionurl:https://github.com/NSIDE-ATTACK-LOGIC/Exploit-Collection

Trust: 0.1

sources: CNVD: CNVD-2017-06905 // VULMON: CVE-2017-8220 // JVNDB: JVNDB-2017-003639

EXTERNAL IDS

db:NVDid:CVE-2017-8220

Trust: 3.2

db:JVNDBid:JVNDB-2017-003639

Trust: 0.8

db:CNNVDid:CNNVD-201704-1458

Trust: 0.7

db:CNVDid:CNVD-2017-06905

Trust: 0.6

db:VULHUBid:VHN-116423

Trust: 0.1

db:VULMONid:CVE-2017-8220

Trust: 0.1

sources: CNVD: CNVD-2017-06905 // VULHUB: VHN-116423 // VULMON: CVE-2017-8220 // JVNDB: JVNDB-2017-003639 // CNNVD: CNNVD-201704-1458 // NVD: CVE-2017-8220

REFERENCES

url:https://pierrekim.github.io/blog/2017-02-09-tplink-c2-and-c20i-vulnerable.html

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2017-8220

Trust: 1.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-8220

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:https://github.com/nside-attack-logic/exploit-collection

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2017-06905 // VULHUB: VHN-116423 // VULMON: CVE-2017-8220 // JVNDB: JVNDB-2017-003639 // CNNVD: CNNVD-201704-1458 // NVD: CVE-2017-8220

SOURCES

db:CNVDid:CNVD-2017-06905
db:VULHUBid:VHN-116423
db:VULMONid:CVE-2017-8220
db:JVNDBid:JVNDB-2017-003639
db:CNNVDid:CNNVD-201704-1458
db:NVDid:CVE-2017-8220

LAST UPDATE DATE

2025-04-20T23:35:50.924000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-06905date:2017-05-18T00:00:00
db:VULHUBid:VHN-116423date:2019-10-03T00:00:00
db:VULMONid:CVE-2017-8220date:2019-10-03T00:00:00
db:JVNDBid:JVNDB-2017-003639date:2017-06-01T00:00:00
db:CNNVDid:CNNVD-201704-1458date:2019-10-23T00:00:00
db:NVDid:CVE-2017-8220date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-06905date:2017-05-18T00:00:00
db:VULHUBid:VHN-116423date:2017-04-25T00:00:00
db:VULMONid:CVE-2017-8220date:2017-04-25T00:00:00
db:JVNDBid:JVNDB-2017-003639date:2017-06-01T00:00:00
db:CNNVDid:CNNVD-201704-1458date:2017-04-27T00:00:00
db:NVDid:CVE-2017-8220date:2017-04-25T20:59:00.257