PT-2023-9174 · Tp Link · Tp-Link Omada Er605

Noam Moshe

+3

·

Published

2023-11-09

·

Updated

2026-02-08

·

CVE-2024-5242

CVSS v3.1
7.5
VectorAV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions TP-Link Omada ER605 (affected versions not specified)
Description The TP-Link Omada ER605 contains a stack-based buffer overflow flaw. This allows network-adjacent attackers to execute arbitrary code on affected devices. Authentication is not required for exploitation, but the device must be configured to use the Comexe DDNS service. The issue stems from improper validation of the length of user-supplied data before copying it to a fixed-length stack-based buffer, leading to potential code execution in the context of root. The vulnerability is related to the handling of DDNS error codes. A two-stage exploitation process can bypass ASLR on MIPS32 LE.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

RCE

Stack Overflow

Weakness Enumeration

Related Identifiers

BDU:2024-04415
CVE-2024-5242
ZDI-24-501

Affected Products

Tp-Link Omada Er605