OS Command Injection in AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Router - CVE-2019-5072

 

OS Command Injection in AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Router - CVE-2019-5072

Published: November 22, 2019


Vulnerability identifier: #VU22915
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2019-5072
CWE-ID: CWE-78
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Shenzhen Tenda Technology Co.,Ltd.
Affected software:
AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Router

Detailed vulnerability description

The vulnerability allows a local user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the "dns2" POST parameter in the "/goform/WanParameterSetting" resource. A local user attacker can send a specially crafted HTTP POST request and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


How to mitigate CVE-2019-5072

Install updates from vendor's website.

Sources