A command execution vulnerability exists in the guest resource functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1850 | Exploit Technical Description Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1850 | Exploit Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1850 - Exploit, Technical Description, Third Party Advisory |
09 Feb 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
First Time |
Tp-link
Tp-link er7206 Tp-link er7206 Firmware |
|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1850 - Exploit, Technical Description, Third Party Advisory | |
CPE | cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:* cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:* |
06 Feb 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-06 17:15
Updated : 2024-11-21 08:24
NVD link : CVE-2023-43482
Mitre link : CVE-2023-43482
CVE.ORG link : CVE-2023-43482
JSON object : View
Products Affected
tp-link
- er7206
- er7206_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')