First published: Thu May 23 2024(Updated: )
This vulnerability allows network-adjacent attackers to access or spoof DDNS messages on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service. The specific flaw exists within the cmxddnsd executable. The issue results from reliance on obscurity to secure network data. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Omada ER605 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-22439 is high, as it allows network-adjacent attackers to access or spoof DDNS messages without authentication on affected devices.
To fix ZDI-CAN-22439, update the firmware of TP-Link Omada ER605 routers to the latest version provided by the vendor.
Devices affected by ZDI-CAN-22439 are limited to TP-Link Omada ER605 routers that are configured to use the Comexe DDNS service.
ZDI-CAN-22439 cannot be exploited remotely as it requires attackers to be on the same network as the affected devices.
No, authentication is not required to exploit ZDI-CAN-22439, making it particularly dangerous for exposed devices.