First published: Thu Nov 21 2019(Updated: )
An exploitable command injection vulnerability exists in the /goform/WanParameterSetting functionality of Tenda AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Route (AC9V1.0 Firmware V15.03.05.16multiTRU). A specially crafted HTTP POST request can cause a command injection in the DNS1 post parameters, resulting in code execution. An attacker can send HTTP POST request with command to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda AC9 V1.0 Firmware | =15.03.05.14_en | |
Tenda AC9 V1.0 Firmware | =15.03.05.16multitru | |
Tenda AC1200 Smart Dual-Band WiFi Router |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5071 has a high severity rating due to its potential for command injection vulnerabilities.
To fix CVE-2019-5071, you should update the router firmware to the latest version provided by Tenda.
CVE-2019-5071 affects Tenda AC9 Router running firmware versions 15.03.05.14_en and 15.03.05.16multiTRU.
An attacker exploiting CVE-2019-5071 can execute arbitrary commands on the affected router, potentially compromising the device.
There is no specific indication that CVE-2019-5071 is currently being actively exploited, but it remains a significant risk if left unpatched.