CVE-2024-5242

Published May 23, 2024

Last updated 6 months ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2024-5242 is a stack-based buffer overflow vulnerability impacting TP-Link Omada ER605 routers. This flaw enables network-adjacent attackers to execute arbitrary code on affected devices without requiring authentication. However, this vulnerability is only exploitable if the router is configured to utilize the Comexe DDNS service. The root cause of the vulnerability lies within the router's handling of DDNS error codes. Specifically, there is a lack of proper validation for the length of user-supplied data before it is copied into a fixed-length stack-based buffer. An attacker can leverage this oversight to execute code with root privileges.

Description
TP-Link Omada ER605 Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service. The specific flaw exists within the handling of DDNS error codes. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22522.
Source
zdi-disclosures@trendmicro.com
NVD status
Analyzed
Products
omada_er605_firmware

Risk scores

CVSS 3.1

Type
Primary
Base score
7.5
Impact score
5.9
Exploitability score
1.6
Vector string
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

CVSS 3.0

Type
Secondary
Base score
7.5
Impact score
5.9
Exploitability score
1.6
Vector string
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

Weaknesses

zdi-disclosures@trendmicro.com
CWE-121

Social media

Hype score
Not currently trending

Configurations