CVE-2019-6487

TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tl-wdr5620_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wdr5620:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:tp-link:tl-wdr3500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wdr3500:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:tp-link:tl-wdr3600_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wdr3600:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:tp-link:tl-wdr4300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wdr4300:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:tp-link:tl-wdr4900_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wdr4900:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:46

Type Values Removed Values Added
References () https://github.com/0xcc-Since2016/TP-Link-WDR-Router-Command-injection_POC/blob/master/poc.py - Exploit, Third Party Advisory () https://github.com/0xcc-Since2016/TP-Link-WDR-Router-Command-injection_POC/blob/master/poc.py - Exploit, Third Party Advisory

Information

Published : 2019-01-18 10:29

Updated : 2024-11-21 04:46


NVD link : CVE-2019-6487

Mitre link : CVE-2019-6487

CVE.ORG link : CVE-2019-6487


JSON object : View

Products Affected

tp-link

  • tl-wdr4900
  • tl-wdr5620
  • tl-wdr3600_firmware
  • tl-wdr3500_firmware
  • tl-wdr5620_firmware
  • tl-wdr3600
  • tl-wdr4900_firmware
  • tl-wdr4300_firmware
  • tl-wdr4300
  • tl-wdr3500
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')