漏洞标题
没有
漏洞描述信息
TP-Link Omada ER605 DHCPv6客户端选项栈基缓冲区溢出远程代码执行漏洞。此漏洞使网络相邻的攻击者能够在受TP-Link Omada ER605路由器影响的安装上执行任意代码。无需身份验证即可利用此漏洞。
该特定漏洞存在于DHCP选项处理中。问题在于,在将用户提供的数据复制到固定长度的栈基缓冲区之前,缺乏对数据长度的有效验证。攻击者可以利用此漏洞以root权限执行代码。相关漏洞编号为ZDI-CAN-22420。
CVSS信息
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
栈缓冲区溢出
漏洞标题
TP-Link Omada ER605 DHCPv6 Client Options Stack-based Buffer Overflow Remote Code Execution Vulnerability
漏洞描述信息
TP-Link Omada ER605 DHCPv6 Client Options Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of DHCP options. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22420.
CVSS信息
N/A
漏洞类别
栈缓冲区溢出
漏洞标题
TP-LINK Omada ER605 安全漏洞
漏洞描述信息
TP-LINK Omada ER605是中国普联(TP-LINK)公司的一款VPN路由器。 TP-LINK Omada ER605 存在安全漏洞。攻击者利用该漏洞可以执行任意代码。
CVSS信息
N/A
漏洞类别
其他