cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2017-16959,https://securityvulnerability.io/vulnerability/CVE-2017-16959,,"The locale feature in cgi-bin/luci on TP-Link TL-WVR, TL-WAR, TL-ER, and TL-R devices allows remote authenticated users to test for the existence of arbitrary files by making an operation=write;locale=%0d request, and then making an operation=read request with a crafted Accept-Language HTTP header, related to the set_sysinfo and get_sysinfo functions in /usr/lib/lua/luci/controller/locale.lua in uhttpd.",Tp-link,Tl-wvr300 Firmware,6.5,MEDIUM,0.02287999913096428,false,false,false,false,,false,false,2017-11-27T10:00:00.000Z,0 CVE-2017-16957,https://securityvulnerability.io/vulnerability/CVE-2017-16957,,"TP-Link TL-WVR, TL-WAR, TL-ER, and TL-R devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the iface field of an admin/diagnostic command to cgi-bin/luci, related to the zone_get_effect_devices function in /usr/lib/lua/luci/controller/admin/diagnostic.lua in uhttpd.",Tp-link,Tl-wvr300 Firmware,8.8,HIGH,0.001970000099390745,false,false,false,false,,false,false,2017-11-27T10:00:00.000Z,0 CVE-2017-16958,https://securityvulnerability.io/vulnerability/CVE-2017-16958,,"TP-Link TL-WVR, TL-WAR, TL-ER, and TL-R devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the t_bindif field of an admin/bridge command to cgi-bin/luci, related to the get_device_byif function in /usr/lib/lua/luci/controller/admin/bridge.lua in uhttpd.",Tp-link,Tl-wvr300 Firmware,8.8,HIGH,0.003120000008493662,false,false,false,false,,false,false,2017-11-27T10:00:00.000Z,0