TP-Link Omada ER605 PPTP VPN username Command Injection Remote Code Execution Vulnerability
CVE-2024-5227
7.5HIGH
What is CVE-2024-5227?
The TP-Link Omada ER605 router is susceptible to a command injection vulnerability that enables network-adjacent attackers to execute arbitrary code. This exploit does not require authentication, making it particularly concerning for devices configured with a PPTP VPN using LDAP authentication. The vulnerability originates from the inadequate validation of the username parameter within the pppd endpoint, allowing attackers to manipulate system calls and execute code with root privileges. Proper configuration and security measures are essential to mitigate this risk.
Affected Version(s)
Omada ER605 2.6_2.2.2 Build 20231017
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
CVSS V3.0
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published