An exploitable command injection vulnerability exists in the /goform/WanParameterSetting functionality of Tenda AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Route (AC9V1.0 Firmware V15.03.05.16multiTRU). A specially crafted HTTP POST request can cause a command injection in the DNS1 post parameters, resulting in code execution. An attacker can send HTTP POST request with command to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0861 | Exploit Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0861 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2019-0861 - Exploit, Third Party Advisory |
Information
Published : 2019-11-21 17:15
Updated : 2024-11-21 04:44
NVD link : CVE-2019-5071
Mitre link : CVE-2019-5071
CVE.ORG link : CVE-2019-5071
JSON object : View
Products Affected
tendacn
- ac9v1.0_firmware
- ac1200_smart_dual-band_gigabit_wifi
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')