Description

TP-Link Omada ER605 Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service. The specific flaw exists within the handling of DDNS error codes. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22522.

INFO

Published Date :

2024-05-23T21:55:59.756Z

Last Modified :

2024-08-01T21:03:11.096Z

Source :

zdi
AFFECTED PRODUCTS

The following products are affected by CVE-2024-5242 vulnerability.

Vendors Products
Tp-link
  • Omada Er605
  • Omada Er605 Firmware
Tp Link
  • Omada Er605
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-5242.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact