Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-5227— TP-Link Omada ER605 PPTP VPN username Command Injection Remote Code Execution Vulnerability

EPSS 2.11% · P84
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-5227

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
TP-Link Omada ER605 PPTP VPN username Command Injection Remote Code Execution Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
TP-Link Omada ER605 PPTP VPN username Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are only vulnerable if configured to use a PPTP VPN with LDAP authentication. The specific flaw exists within the handling of the username parameter provided to the /usr/bin/pppd endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22446.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
TP-Link Omada ER605 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
TP-LINK Omada ER605是中国普联(TP-LINK)公司的一款VPN路由器。 TP-Link Omada ER605 存在安全漏洞,该漏洞源于通过 PPTP VPN 用户名可以进行命令注入并导致远程代码执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
TP-LinkOmada ER605 2.6_2.2.2 Build 20231017 -

II. Public POCs for CVE-2024-5227

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-5227

登录查看更多情报信息。

Same Patch Batch · TP-Link · 2024-05-23 · 5 CVEs total

CVE-2024-5244TP-Link Omada ER605 Reliance on Security Through Obscurity Vulnerability
CVE-2024-5242TP-Link Omada ER605 Stack-based Buffer Overflow Remote Code Execution Vulnerability
CVE-2024-5228TP-Link Omada ER605 Comexe DDNS Response Handling Heap-based Buffer Overflow Remote Code
CVE-2024-5243TP-Link Omada ER605 Buffer Overflow Remote Code Execution Vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2024-5227

No comments yet


Leave a comment