#VU86209 OS Command Injection in ER7206 - CVE-2023-43482

 

#VU86209 OS Command Injection in ER7206 - CVE-2023-43482

Published: February 7, 2024 / Updated: June 21, 2024


Vulnerability identifier: #VU86209
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear
CVE-ID: CVE-2023-43482
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
ER7206
Software vendor:
TP-Link

Description

The vulnerability allows a remote user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the guest resource functionality. A remote administrator can pass specially crafted data to the application and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links