Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| TP-Link | Omada ER605 | 2.6_2.2.2 Build 20231017 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Pre-authentication Remote Code Execution exploit for TP-Link Omada ER605 router via DDNS client daemon (cmxddnsd) | https://github.com/redpack-kr/CVE-2024-5243-pwn2own-toronto-2023 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-5244 | TP-Link Omada ER605 Reliance on Security Through Obscurity Vulnerability | |
| CVE-2024-5227 | TP-Link Omada ER605 PPTP VPN username Command Injection Remote Code Execution Vulnerabilit | |
| CVE-2024-5242 | TP-Link Omada ER605 Stack-based Buffer Overflow Remote Code Execution Vulnerability | |
| CVE-2024-5228 | TP-Link Omada ER605 Comexe DDNS Response Handling Heap-based Buffer Overflow Remote Code |
No comments yet