First published: Thu Nov 21 2019(Updated: )
An exploitable command injection vulnerability exists in the /goform/WanParameterSetting functionality of Tenda AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Route (AC9V1.0 Firmware V15.03.05.16multiTRU). A specially crafted HTTP POST request can cause a command injection in the DNS2 post parameters, resulting in code execution. An attacker can send HTTP POST request with command to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tendacn Ac9v1.0 Firmware | =15.03.05.14_en | |
Tendacn Ac9v1.0 Firmware | =15.03.05.16multitru | |
Tendacn Ac1200 Smart Dual-band Gigabit Wifi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-5072 is high (7.8).
CVE-2019-5072 affects Tenda AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Router.
The affected software version of CVE-2019-5072 is Tendacn Ac9v1.0 Firmware V15.03.05.14_en and V15.03.05.16multiTRU.
A command injection vulnerability in CVE-2019-5072 can be exploited by sending a specially crafted HTTP POST request with a malicious payload in the DNS2 post parameter.
You can find more information about CVE-2019-5072 at the following URL: https://talosintelligence.com/vulnerability_reports/TALOS-2019-0861.