First published: Mon Feb 05 2024(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605. Authentication is required to exploit this vulnerability. The specific issue exists within the handling of the name field in the access control user interface. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Omada ER605 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-22227 has been classified as a critical vulnerability that allows arbitrary code execution.
To fix ZDI-CAN-22227, update the TP-Link Omada ER605 to the latest security patched version.
ZDI-CAN-22227 affects installations of TP-Link Omada ER605 that are not updated to the latest security version.
Yes, authentication is required to exploit the ZDI-CAN-22227 vulnerability.
ZDI-CAN-22227 allows network-adjacent attackers to execute arbitrary code on affected devices.