CVE-2019-5072

An exploitable command injection vulnerability exists in the /goform/WanParameterSetting functionality of Tenda AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Route (AC9V1.0 Firmware V15.03.05.16multiTRU). A specially crafted HTTP POST request can cause a command injection in the DNS2 post parameters, resulting in code execution. An attacker can send HTTP POST request with command to trigger this vulnerability.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0861 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:tendacn:ac9v1.0_firmware:15.03.05.14_en:*:*:*:*:*:*:*
cpe:2.3:o:tendacn:ac9v1.0_firmware:15.03.05.16multitru:*:*:*:*:*:*:*
cpe:2.3:h:tendacn:ac1200_smart_dual-band_gigabit_wifi:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-11-21 17:15

Updated : 2023-12-10 13:13


NVD link : CVE-2019-5072

Mitre link : CVE-2019-5072

CVE.ORG link : CVE-2019-5072


JSON object : View

Products Affected

tendacn

  • ac9v1.0_firmware
  • ac1200_smart_dual-band_gigabit_wifi
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')