Lucene search

K
zdiCyrille ChatrasZDI-22-1466
HistoryOct 25, 2022 - 12:00 a.m.

TP-Link TL-WR841N ated_tp Command Injection Remote Code Execution Vulnerability

2022-10-2500:00:00
Cyrille Chatras
www.zerodayinitiative.com
30
tp-link
tl-wr841n
command injection
remote code execution
vulnerability
authentication bypass
service flaw
user-supplied string
system call
root context

0.0005 Low

EPSS

Percentile

18.0%

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR841N routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the ated_tp service. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.

0.0005 Low

EPSS

Percentile

18.0%

Related for ZDI-22-1466