Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-50871 | A post authentication command injection vulnerability exists when configuring the wireguard VPN functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection . An attacker can make an authenticated HTTP request to trigger this vulnerability. |
Tue, 04 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 04 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:tp-link:er7206_firmware:1.3.0_build_20230322_rel.70591:*:*:*:*:*:*:* | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-11-04T18:18:47.927Z
Reserved: 2023-11-13T17:01:34.935Z
Link: CVE-2023-46683
Updated: 2025-11-04T18:18:47.927Z
Status : Modified
Published: 2024-02-06T17:15:09.180
Modified: 2025-11-04T19:16:04.423
Link: CVE-2023-46683
No data.
OpenCVE Enrichment
No data.
EUVD