First published: Tue Feb 06 2024(Updated: )
A post authentication command execution vulnerability exists in the web filtering functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Tp-link Er7206 Firmware | =1.3.0-build_20230322_rel_70591 | |
TP-Link ER7206 Omada Gigabit VPN Router |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-47618 is considered to have a high severity due to its potential for arbitrary command execution after authentication.
To mitigate CVE-2023-47618, upgrade the affected TP-Link ER7206 Omada Gigabit VPN Router firmware to the latest version provided by TP-Link.
CVE-2023-47618 is categorized as a post authentication command execution vulnerability within the web filtering functionality.
The vulnerability affects users running the TP-Link ER7206 Omada Gigabit VPN Router with firmware version 1.3.0 build 20230322 Rel.70591.
An attacker can exploit CVE-2023-47618 to execute arbitrary commands on the affected TP-Link ER7206 router by sending specially crafted authenticated HTTP requests.