A vulnerability exists within the httpd server of the TP-Link WA850RE Universal Wi-Fi Range Extender that allows authenticated attackers to inject arbitrary commands as arguments to an execve() call due to a lack of input sanitization. Injected commands are executed with root privileges. This issue is further exacerbated when combined with the configuration leak from EIP-9098806c.
- Exodus Intelligence: EIP-7758d2d4
- MITRE CVE: TBD
- CVSSv2 Score: 7.7
- 850RE V2: https://www.tp-link.com/us/support/download/tl-wa850re/v2/#Firmware
- 850RE V3: https://www.tp-link.com/us/support/download/tl-wa850re/v3/#Firmware
- Exodus Intelligence
- Disclosed to affected vendor: December 10th, 2021
- Disclosed to public: June 23rd, 2022
Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at firstname.lastname@example.org.
Researchers who are interested in monetizing their 0Day and NDay can work with us through our Research Sponsorship Program (RSP).