First published: Mon Feb 05 2024(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605. Authentication is required to exploit this vulnerability. The specific issue exists within the handling of the name field in the access control user interface. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Omada ER605 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-086 is considered critical due to the potential for arbitrary code execution.
To fix ZDI-24-086, update your TP-Link Omada ER605 to the latest firmware version provided by TP-Link.
ZDI-24-086 affects installations of the TP-Link Omada ER605 that have not been patched.
ZDI-24-086 describes an arbitrary code execution vulnerability that can be exploited by network-adjacent attackers.
Yes, authentication is required to exploit the vulnerability described in ZDI-24-086.