First published: Wed Jan 06 2021(Updated: )
oal_ipt_addBridgeIsolationRules on TP-Link TL-WR840N 6_EU_0.9.1_4.16 devices allows OS command injection because a raw string entered from the web interface (an IP address field) is used directly for a call to the system library function (for iptables). NOTE: oal_ipt_addBridgeIsolationRules is not the only function that calls util_execSystem.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr840n Firmware | =6_eu_0.9.1_4.16 | |
TP-LINK TL-WR840N |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-36178 is critical.
CVE-2020-36178 allows OS command injection by using a raw string from the web interface for a call to the system library function.
TP-Link TL-WR840N 6_EU_0.9.1_4.16 devices are affected by CVE-2020-36178.
To fix CVE-2020-36178, update the firmware of your TP-Link TL-WR840N 6_EU_0.9.1_4.16 device to a non-vulnerable version.
You can find more information about CVE-2020-36178 at the following references: [link1], [link2], [link3].