CVE-2023-47618

A post authentication command execution vulnerability exists in the web filtering functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1859 Exploit Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:*
cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*

History

09 Feb 2024, 02:10

Type Values Removed Values Added
First Time Tp-link
Tp-link er7206
Tp-link er7206 Firmware
Summary
  • (es) Existe una vulnerabilidad de ejecución de comando posterior a la autenticación en la funcionalidad de filtrado web de Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. Una solicitud HTTP especialmente manipulada puede provocar la ejecución de un comando arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para desencadenar esta vulnerabilidad.
CPE cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:*
References () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1859 - () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1859 - Exploit, Technical Description, Third Party Advisory

06 Feb 2024, 18:15

Type Values Removed Values Added
References
  • {'url': 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1859', 'source': 'talos-cna@cisco.com'}

06 Feb 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-06 17:15

Updated : 2024-02-09 02:10


NVD link : CVE-2023-47618

Mitre link : CVE-2023-47618

CVE.ORG link : CVE-2023-47618


JSON object : View

Products Affected

tp-link

  • er7206_firmware
  • er7206
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')