Recently, ZDI disclosed the technical details of a TP-Link command injection vulnerability used in the Pwn2Own Tokyo competition. The vulnerability number of this vulnerability is CVE-2020-10882.
According to the ZDI analysis report, a command injection vulnerability exists in the binary program /usr/bin/tdpServer
in the affected router. This binary program is running on the TP-Link Archer A7 (AC1750) router, hardware version 5, MIPS Architecture, firmware version 190726. The vulnerability exists in tdpServer’s code for handling TP-Link onemesh
related functions. Onemesh
is a proprietary function that TP-Link is responsible for Mesh
tdpServer opens UDP 20002 to communicate with external functions.
When the value of slaveMac is controlled, it can cause a command injection. Affected users should update the firmware version to TP-Link A7 (US) _V5_200220.
The post CVE-2020-10882: TP-Link Command Injection Vulnerability Alert appeared first on InfoTech News.