Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mqq6-542f-w38g

Опубликовано: 06 фев. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 7.2

Описание

A post authentication command execution vulnerability exists in the web filtering functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.

A post authentication command execution vulnerability exists in the web filtering functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.

EPSS

Процентиль: 56%
0.0034
Низкий

7.2 High

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 7.2
nvd
около 2 лет назад

A post authentication command execution vulnerability exists in the web filtering functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.

CVSS3: 7.2
fstec
около 2 лет назад

Уязвимость веб-сервера uHTTPd микропрограммного обеспечения VPN-маршрутизатора TP-Link ER7206 Omada, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 56%
0.0034
Низкий

7.2 High

CVSS3

Дефекты

CWE-78