#VU22915 OS Command Injection in AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Router - CVE-2019-5072

 

#VU22915 OS Command Injection in AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Router - CVE-2019-5072

Published: November 22, 2019


Vulnerability identifier: #VU22915
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2019-5072
CWE-ID: CWE-78
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Router
Software vendor:
Shenzhen Tenda Technology Co.,Ltd.

Description

The vulnerability allows a local user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the "dns2" POST parameter in the "/goform/WanParameterSetting" resource. A local user attacker can send a specially crafted HTTP POST request and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links