PT-2023-9172 · Tp Link · Tp-Link Omada Er605
Noam Moshe
+3
·
Published
2023-11-15
·
Updated
2026-02-08
·
CVE-2024-5244
CVSS v3.1
5.0
Medium
| AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L |
Name of the Vulnerable Software and Affected Versions
TP-Link Omada ER605 (affected versions not specified)
Description
The issue is related to the use of weak protection mechanisms in the cmxddnsd executable of the TP-Link Omada ER605 router's firmware. This allows a remote attacker to execute arbitrary code in the context of root. The vulnerability can be exploited by network-adjacent attackers to access or spoof DDNS messages on affected installations, with no authentication required. However, devices are only vulnerable if configured to use the Comexe DDNS service.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Tp-Link Omada Er605