Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mj59-82hp-pgf4

Опубликовано: 06 фев. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 7.2

Описание

A post-authentication command injection vulnerability exists in the PPTP client functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability and gain access to an unrestricted shell.

A post-authentication command injection vulnerability exists in the PPTP client functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability and gain access to an unrestricted shell.

EPSS

Процентиль: 73%
0.00781
Низкий

7.2 High

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 7.2
nvd
около 2 лет назад

A post-authentication command injection vulnerability exists in the PPTP client functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability and gain access to an unrestricted shell.

CVSS3: 7.2
fstec
около 2 лет назад

Уязвимость PPTP-клиента микропрограммного обеспечения VPN-маршрутизатора TP-Link ER7206 Omada, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 73%
0.00781
Низкий

7.2 High

CVSS3

Дефекты

CWE-78