PT-2023-9173 · Tp Link · Tp-Link Omada Er605

Noam Moshe

+3

·

Published

2023-11-15

·

Updated

2026-02-08

·

CVE-2024-5243

CVSS v3.1
7.5
VectorAV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions TP-Link Omada ER605 (affected versions not specified)
Description This issue allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. The flaw exists within the handling of DNS names due to the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Authentication is not required to exploit this vulnerability, but devices are only vulnerable if configured to use the Comexe DDNS service.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

RCE

Buffer Overflow

Weakness Enumeration

Related Identifiers

BDU:2024-04414
CVE-2024-5243
ZDI-24-502

Affected Products

Tp-Link Omada Er605