Feb. 5, 2024, 6 a.m. |

ZDI: Published Advisories www.zerodayinitiative.com

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2024-1179.

arbitrary code attackers authentication buffer buffer overflow client code code execution cve cves cvss dhcpv6 exploit link network omada options overflow pwn2own rating remote code remote code execution routers stack tp-link vulnerability zdi

More from www.zerodayinitiative.com / ZDI: Published Advisories

Solution Architect H/F

@ Exotec | Lille, Hauts-de-France, France

Chef de projet Sécurité SI

@ Alter Solutions | Paris, France

Audit Manager / Sr Audit Manager IT - 90379779 - Washington

@ Amtrak | Washington, DC, US, 20002

Auditor IT - 90379778 - Washington

@ Amtrak | Washington, DC, US, 20002

1210/ 1241/ 1155 - Senior Network Engineer

@ Sigma Defense | San Diego, California, United States

SharePoint Cloud Administrator

@ Resource Management Concepts, Inc. | Dahlgren, Virginia, United States