CVE-2017-16541
MEDIUMTor Browser < 7.0.9 - Unauthenticated IP Address Exposure via file:// URL Handling
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2017-16541. PoCs published by Ethan-Chen-uwo.
AI-analyzed exploit summary This repository contains only a README file with no exploit code or technical details. It appears to be a placeholder or incomplete writeup for CVE-2017-16541.
Description
Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.
Exploits (1)
nomisec
WRITEUP
by Ethan-Chen-uwo · poc
https://github.com/Ethan-Chen-uwo/A-breif-introduction-of-CVE-2017-16541
This repository contains only a README file with no exploit code or technical details. It appears to be a placeholder or incomplete writeup for CVE-2017-16541.
Classification
Writeup 90%
Attack Type
Other
Complexity
Trivial
Reliability
Theoretical
Target:
unknown
No auth needed
devstral-2 · analyzed Feb 16, 2026
Full analysis →
References (15)
Core 15
Core References
Issue Tracking, Vendor Advisory x_refsource_misc
https://trac.torproject.org/projects/tor/ticket/24052
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201810-01
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:2693
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
Issue Tracking, Third Party Advisory x_refsource_misc
https://www.wearesegment.com/research/tormoil-torbrowser-unspecified-critical-security-vulnerability/
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201811-13
Issue Tracking, Third Party Advisory x_refsource_misc
https://www.bleepingcomputer.com/news/security/tormoil-vulnerability-leaks-real-ip-address-from-tor-browser-users/
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2018/dsa-4327
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:3403
Issue Tracking, Vendor Advisory x_refsource_misc
https://blog.torproject.org/tor-browser-709-released
Broken Link vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1041610
Broken Link vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/101665
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:2692
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:3458
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://bugzilla.mozilla.org/show_bug.cgi?id=1412081
Scores
CVSS v3
6.5
EPSS
0.0769
EPSS Percentile
92.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Details
CWE
CWE-200
Status
published
Products (16)
debian/debian_linux
8.0
debian/debian_linux
9.0
redhat/enterprise_linux_desktop
6.0
redhat/enterprise_linux_desktop
7.0
redhat/enterprise_linux_eus
7.5
redhat/enterprise_linux_eus
7.6
redhat/enterprise_linux_eus
7.7
redhat/enterprise_linux_server
6.0
redhat/enterprise_linux_server
7.0
redhat/enterprise_linux_server_aus
7.6
... and 6 more
Published
Nov 04, 2017
Tracked Since
Feb 18, 2026