TP-Link.EAP.Controller.Command.Execution
Description
This indicates an attack attempt to exploit a Command Execution vulnerability in TP-Link EAP Controller and Omada Controller.
The vulnerability is caused by insufficient sanitizing in the usage of Web API. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted client request.
Affected Products
TP-LINK Omada Controller 2.6.0
TP-LINK Omada Controller 2.5.4
TP-LINK EAP Controller 2.6.0
TP-LINK EAP Controller 2.5.4
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Upgrade to the latest version, available from the web site.
https://www.tp-link.com/en/download/EAP-Controller.html#Controller_Software
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |