Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-46683: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Tp-Link ER7206 Omada Gigabit VPN Router

0
High
VulnerabilityCVE-2023-46683cvecve-2023-46683cwe-78
Published: Tue Feb 06 2024 (02/06/2024, 16:20:13 UTC)
Source: CVE Database V5
Vendor/Project: Tp-Link
Product: ER7206 Omada Gigabit VPN Router

Description

A post authentication command injection vulnerability exists when configuring the wireguard VPN functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection . An attacker can make an authenticated HTTP request to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:00:15 UTC

Technical Analysis

CVE-2023-46683 is an OS command injection vulnerability classified under CWE-78, affecting the Tp-Link ER7206 Omada Gigabit VPN Router, specifically firmware version 1.3.0 build 20230322 Rel.70591. The vulnerability arises from improper neutralization of special elements in the WireGuard VPN configuration functionality, allowing an authenticated attacker to send a specially crafted HTTP request that injects arbitrary OS commands. This flaw is post-authentication, meaning the attacker must have valid credentials or exploit other means to authenticate first. The vulnerability is remotely exploitable over the network without requiring user interaction beyond authentication. The CVSS v3.1 score of 7.2 reflects a high severity with network attack vector, low attack complexity, high privileges required, and no user interaction. The impact includes full compromise of the router, enabling attackers to execute arbitrary commands, potentially leading to data exfiltration, network disruption, or pivoting to internal networks. No patches are currently linked, and no public exploits have been reported, but the vulnerability poses a significant risk due to the critical role of VPN routers in network security.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to severe consequences including unauthorized access to internal networks, interception or manipulation of VPN traffic, and disruption of critical network services. Confidentiality is at risk as attackers could extract sensitive data passing through the VPN. Integrity and availability are also threatened since arbitrary command execution could modify configurations or cause denial of service. Organizations relying on the Tp-Link ER7206 router for secure remote access, especially in sectors like finance, healthcare, and government, face heightened risks. The vulnerability could facilitate lateral movement within networks, increasing the attack surface for further compromise. Given the router’s role as a network gateway, successful exploitation could undermine overall organizational cybersecurity posture.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the router’s management interface to trusted networks and users, enforcing strong authentication mechanisms, and monitoring logs for unusual configuration changes or HTTP requests targeting the WireGuard VPN settings. Network segmentation should be employed to limit the router’s exposure. Organizations should follow Tp-Link’s advisories closely and apply firmware updates as soon as patches become available. In the absence of patches, disabling the WireGuard VPN functionality temporarily can reduce risk. Employing intrusion detection systems (IDS) to detect anomalous command injection attempts and conducting regular security audits of VPN configurations are recommended. Additionally, implementing multi-factor authentication (MFA) for router access can reduce the risk of credential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-11-13T17:01:34.935Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a47376d939959c8021b2e

Added to database: 11/4/2025, 6:34:31 PM

Last enriched: 11/4/2025, 7:00:15 PM

Last updated: 11/5/2025, 2:02:23 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats