CVE-2019-5071

An exploitable command injection vulnerability exists in the /goform/WanParameterSetting functionality of Tenda AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Route (AC9V1.0 Firmware V15.03.05.16multiTRU). A specially crafted HTTP POST request can cause a command injection in the DNS1 post parameters, resulting in code execution. An attacker can send HTTP POST request with command to trigger this vulnerability.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:tendacn:ac9v1.0_firmware:15.03.05.14_en:*:*:*:*:*:*:*
cpe:2.3:o:tendacn:ac9v1.0_firmware:15.03.05.16multitru:*:*:*:*:*:*:*
cpe:2.3:h:tendacn:ac1200_smart_dual-band_gigabit_wifi:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:44

Type Values Removed Values Added
References () https://talosintelligence.com/vulnerability_reports/TALOS-2019-0861 - Exploit, Third Party Advisory () https://talosintelligence.com/vulnerability_reports/TALOS-2019-0861 - Exploit, Third Party Advisory

Information

Published : 2019-11-21 17:15

Updated : 2024-11-21 04:44


NVD link : CVE-2019-5071

Mitre link : CVE-2019-5071

CVE.ORG link : CVE-2019-5071


JSON object : View

Products Affected

tendacn

  • ac9v1.0_firmware
  • ac1200_smart_dual-band_gigabit_wifi
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')