9.8
CVSSv3

CVE-2020-9374

Published: 24/02/2020 Updated: 01/01/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

On TP-Link TL-WR849N 0.9.1 4.16 devices, a remote command execution vulnerability in the diagnostics area can be exploited when an attacker sends specific shell metacharacters to the panel's traceroute feature.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tp-link tl-wr849n_firmware 0.9.1_4.16

Exploits

# Exploit Title: TP LINK TL-WR849N - Remote Code Execution # Date: 2019-11-20 # Exploit Author: Elber Tavares # Vendor Homepage: wwwtp-linkcom/ # Software Link: wwwtp-linkcom/br/support/download/tl-wr849n/#Firmware # Version: TL-WR849N 091 416 # Tested on: linux, windows # CVE : CVE-2020-9374 import requests def output(hea ...
TP-Link TL-WR849N suffers from a remote code execution vulnerability ...

Github Repositories

OpenSource Repo with PoC's and vulns found in routers TP LINK TL-WR849N - REMOTE COMMAND EXECUTION PoC [CVE-2020-9374] - TP LINK TL-WR849N - REMOTE COMMAND EXECUTION PoC Payload: "$(ls)" TP LINK TL-WR849N - Auth Bypass: Firmware and Configs update TP LINK TL-WR849N - REMOTE COMMAND EXECUTION PoC Payload: curl -X GET -H