First published: Wed Apr 03 2024(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605. Authentication is required to exploit this vulnerability. The specific issue exists within the handling of the name field in the access control user interface. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Omada ER605 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1180 has a high severity rating due to the potential for arbitrary code execution by authenticated attackers.
To fix CVE-2024-1180, update your TP-Link Omada ER605 to the latest firmware version provided by TP-Link.
CVE-2024-1180 affects users of the TP-Link Omada ER605 who have not yet applied the latest security updates.
CVE-2024-1180 can be exploited by network-adjacent attackers leveraging authentication to execute arbitrary code.
Yes, authentication is required to exploit CVE-2024-1180.