Command Injection Vulnerability in TP-Link WDR Series Devices
CVE-2019-6487
Key Information:
- Vendor
Tp-link
- Status
- Vendor
- CVE Published:
- 3 October 2022
Badges
What is CVE-2019-6487?
Certain TP-Link WDR Series devices, particularly through firmware version 3, are susceptible to a command injection vulnerability that may allow an authenticated attacker to execute arbitrary commands on the device. This occurs due to the inappropriate handling of shell metacharacters in the 'get_weather_observe citycode' field. By exploiting this flaw, attackers could potentially gain unauthorized access, compromising the security of the affected devices and the network they operate within.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
24% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
- 🟡
Public PoC available
- 👾
Exploit known to exist