[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

TP-Link ER605 Unauthent LAN-side Remote Code Execution Exploit

[ 0Day-ID-39152 ]
Full title
TP-Link ER605 Unauthent LAN-side Remote Code Execution Exploit [ Highlight ]
Highlight - is paid service, that can help to get more visitors to your material.

Price: 10
Date add
Category
Platform
Verified
Price
 
0.016 BTC

 
1 500 USD
Risk
[
Security Risk Critical
]
Rel. releases
Description
TP-Link ER605 command injection lead to unauthent LAN-side RCE
Usage info
Example: python3 exp.py -i <IP target> -l <IP reverse> -p <PORT reverse>
Affected ver
ER605 V1 all version
ER605 V2 version <= ER605(UN)_V2_2.1.2 Build 20230210
Tested on
ER605 V1
ER605 V2 verion ER605(UN)_V2_2.1.2 Build 20230210
CWE
CWE 78: OS Command Injection
Tags
tplink   er605   rce  
Prooves Information
Video proof
Other Information
Abuses
0
Comments
0
Views
18 301
We DO NOT use Telegram or any messengers / social networks! We DO NOT use Telegram or any messengers / social networks! Please, beware of scammers!
Please login or register to buy exploit.
OR
Buy incognito
0
0
Verified by 0day Admin
Verified by 0day Admin
This material is checked by Administration and absolutely workable.
Learn more about    GOLD:
0day.today Gold is the currency of 0day.today project and is denoted on this site as such image: . It used for paying for the services, buying exploits, earning money, etc
We accept:
BitCoin (BTC)
You can pay us via BTC
LiteCoin (LTC)
You can pay us via LTC
Ethereum (ETH)
You can pay us via ETH

Author
BL
29
Exploits
1
Readers
1
[ Comments: 0 ]
Terms of use of comments:
  • Users are forbidden to exchange personal contact details
  • Haggle on other sites\projects is forbidden
  • Reselling is forbidden
Punishment: permanent block of user account with all Gold.

Login or register to leave comments