Advisory Details

February 5th, 2024

TP-Link Omada ER605 Access Control Command Injection Remote Code Execution Vulnerability

ZDI-24-086
ZDI-CAN-22227

CVE ID CVE-2024-1180
CVSS SCORE 6.8, AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS TP-Link
AFFECTED PRODUCTS Omada ER605
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605. Authentication is required to exploit this vulnerability.

The specific issue exists within the handling of the name field in the access control user interface. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.

ADDITIONAL DETAILS

Fixed in firmware: ER605(UN)_V2_2.2.3 Build 20231201


DISCLOSURE TIMELINE
  • 2023-11-16 - Vulnerability reported to vendor
  • 2024-02-05 - Coordinated public release of advisory
  • 2024-07-01 - Advisory Updated
CREDIT Noam Moshe of Claroty Research - Team82
BACK TO ADVISORIES