The specific flaw exists within the handling of the username parameter provided to the /usr/bin/pppd endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22446.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-46466 | TP-Link Omada ER605 PPTP VPN username Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are only vulnerable if configured to use a PPTP VPN with LDAP authentication. The specific flaw exists within the handling of the username parameter provided to the /usr/bin/pppd endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22446. |
| Link | Providers |
|---|---|
| https://www.zerodayinitiative.com/advisories/ZDI-24-499/ |
|
Wed, 06 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link omada Er605 Tp-link omada Er605 Firmware |
|
| CPEs | cpe:2.3:h:tp-link:omada_er605:2.6:*:*:*:*:*:*:* cpe:2.3:o:tp-link:omada_er605_firmware:2.2.2:build_20231017:*:*:*:*:*:* |
|
| Vendors & Products |
Tp-link
Tp-link omada Er605 Tp-link omada Er605 Firmware |
|
| Metrics |
cvssV3_1
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2024-09-03T16:05:33.661Z
Reserved: 2024-05-22T20:15:04.846Z
Link: CVE-2024-5227
Updated: 2024-08-01T21:03:10.983Z
Status : Analyzed
Published: 2024-05-23T22:15:12.727
Modified: 2025-08-06T14:13:07.853
Link: CVE-2024-5227
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:10:05Z
EUVD