First published: Tue Feb 06 2024(Updated: )
A post-authentication command injection vulnerability exists in the PPTP client functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability and gain access to an unrestricted shell.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
TP-Link ER7206 Firmware | =1.3.0-build_20230322_rel_70591 | |
TP-Link ER7206 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-36498 has a high severity rating due to its post-authentication command injection capabilities.
The recommended fix for CVE-2023-36498 is to update the TP-Link ER7206 Omada Gigabit VPN Router to the latest firmware version.
CVE-2023-36498 affects users running the affected version of TP-Link ER7206 firmware 1.3.0 build 20230322 Rel.70591.
The impact of CVE-2023-36498 allows an authenticated attacker to execute arbitrary commands on the affected device.
CVE-2023-36498 requires an authenticated user to send a specially crafted HTTP request to exploit the vulnerability.