← Back to CVEs
CVE-2019-5071
HIGH7.8
Description
An exploitable command injection vulnerability exists in the /goform/WanParameterSetting functionality of Tenda AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Route (AC9V1.0 Firmware V15.03.05.16multiTRU). A specially crafted HTTP POST request can cause a command injection in the DNS1 post parameters, resulting in code execution. An attacker can send HTTP POST request with command to trigger this vulnerability.
CVE Details
CVSS v3.1 Score7.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published11/21/2019
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
tendacn:ac1200_smart_dual-band_gigabit_wifitendacn:ac9v1.0_firmware
Weaknesses (CWE)
CWE-78CWE-78
References
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0861(talos-cna@cisco.com)
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0861(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.