CVE-2024-1179: CWE-121: Stack-based Buffer Overflow in TP-Link Omada ER605
TP-Link Omada ER605 DHCPv6 Client Options Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of DHCP options. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22420.
AI Analysis
Technical Summary
CVE-2024-1179 is a stack-based buffer overflow vulnerability identified in the DHCPv6 client options processing component of the TP-Link Omada ER605 router, specifically in firmware version 2_2.2.2 Build 20231017. The vulnerability is classified under CWE-121, indicating improper bounds checking on stack buffers. The root cause is the failure to validate the length of user-supplied DHCPv6 option data before copying it into a fixed-length stack buffer. An attacker positioned on the same network segment (network-adjacent) can send specially crafted DHCPv6 packets containing oversized option data to the vulnerable router. This triggers a buffer overflow condition, allowing the attacker to overwrite the stack and execute arbitrary code with root privileges on the device. Notably, exploitation does not require any authentication or user interaction, increasing the risk profile. The vulnerability impacts the confidentiality, integrity, and availability of the router, potentially allowing full device compromise, network traffic interception, or disruption of network services. The CVSS v3.0 score of 7.5 reflects high severity, with attack vector being adjacent network, high impact on all security properties, and no privileges or user interaction required. While no public exploits have been reported yet, the presence of this vulnerability in a widely deployed network device makes it a critical concern. The vulnerability was reported by the Zero Day Initiative (ZDI) under ZDI-CAN-22420 and publicly disclosed on April 1, 2024. No official patches were listed at the time of disclosure, emphasizing the need for immediate risk mitigation.
Potential Impact
Successful exploitation of CVE-2024-1179 can lead to complete compromise of affected TP-Link Omada ER605 routers, granting attackers root-level control. This enables attackers to intercept, modify, or redirect network traffic, disrupt network availability, or use the compromised device as a foothold for lateral movement within an organization’s network. The vulnerability affects the confidentiality, integrity, and availability of network communications and infrastructure. Organizations relying on these routers for critical network functions, especially those using DHCPv6, face risks of data breaches, service outages, and potential further compromise of connected systems. Given the lack of authentication required and the ability to exploit remotely from the adjacent network, the attack surface is significant in environments where these devices are accessible. This could impact enterprise networks, managed service providers, and large-scale deployments in government or critical infrastructure sectors. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as weaponization could occur rapidly following disclosure.
Mitigation Recommendations
1. Monitor TP-Link’s official channels for firmware updates addressing CVE-2024-1179 and apply patches immediately upon release. 2. Restrict access to the router’s management interfaces and DHCPv6 services to trusted network segments only, using VLAN segmentation and firewall rules to limit exposure. 3. Disable DHCPv6 client functionality on the router if not required in the network environment to reduce attack surface. 4. Implement network monitoring and intrusion detection systems capable of identifying anomalous or malformed DHCPv6 traffic indicative of exploitation attempts. 5. Employ network access control (NAC) to limit devices that can connect to the same network segment as the vulnerable router. 6. Conduct regular security assessments and penetration tests focusing on network infrastructure devices to identify and remediate similar vulnerabilities proactively. 7. Educate network administrators about the risks of buffer overflow vulnerabilities and the importance of timely patch management for network hardware.
Affected Countries
United States, China, Germany, United Kingdom, India, Brazil, Australia, Canada, France, Japan, South Korea
CVE-2024-1179: CWE-121: Stack-based Buffer Overflow in TP-Link Omada ER605
Description
TP-Link Omada ER605 DHCPv6 Client Options Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of DHCP options. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22420.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-1179 is a stack-based buffer overflow vulnerability identified in the DHCPv6 client options processing component of the TP-Link Omada ER605 router, specifically in firmware version 2_2.2.2 Build 20231017. The vulnerability is classified under CWE-121, indicating improper bounds checking on stack buffers. The root cause is the failure to validate the length of user-supplied DHCPv6 option data before copying it into a fixed-length stack buffer. An attacker positioned on the same network segment (network-adjacent) can send specially crafted DHCPv6 packets containing oversized option data to the vulnerable router. This triggers a buffer overflow condition, allowing the attacker to overwrite the stack and execute arbitrary code with root privileges on the device. Notably, exploitation does not require any authentication or user interaction, increasing the risk profile. The vulnerability impacts the confidentiality, integrity, and availability of the router, potentially allowing full device compromise, network traffic interception, or disruption of network services. The CVSS v3.0 score of 7.5 reflects high severity, with attack vector being adjacent network, high impact on all security properties, and no privileges or user interaction required. While no public exploits have been reported yet, the presence of this vulnerability in a widely deployed network device makes it a critical concern. The vulnerability was reported by the Zero Day Initiative (ZDI) under ZDI-CAN-22420 and publicly disclosed on April 1, 2024. No official patches were listed at the time of disclosure, emphasizing the need for immediate risk mitigation.
Potential Impact
Successful exploitation of CVE-2024-1179 can lead to complete compromise of affected TP-Link Omada ER605 routers, granting attackers root-level control. This enables attackers to intercept, modify, or redirect network traffic, disrupt network availability, or use the compromised device as a foothold for lateral movement within an organization’s network. The vulnerability affects the confidentiality, integrity, and availability of network communications and infrastructure. Organizations relying on these routers for critical network functions, especially those using DHCPv6, face risks of data breaches, service outages, and potential further compromise of connected systems. Given the lack of authentication required and the ability to exploit remotely from the adjacent network, the attack surface is significant in environments where these devices are accessible. This could impact enterprise networks, managed service providers, and large-scale deployments in government or critical infrastructure sectors. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as weaponization could occur rapidly following disclosure.
Mitigation Recommendations
1. Monitor TP-Link’s official channels for firmware updates addressing CVE-2024-1179 and apply patches immediately upon release. 2. Restrict access to the router’s management interfaces and DHCPv6 services to trusted network segments only, using VLAN segmentation and firewall rules to limit exposure. 3. Disable DHCPv6 client functionality on the router if not required in the network environment to reduce attack surface. 4. Implement network monitoring and intrusion detection systems capable of identifying anomalous or malformed DHCPv6 traffic indicative of exploitation attempts. 5. Employ network access control (NAC) to limit devices that can connect to the same network segment as the vulnerable router. 6. Conduct regular security assessments and penetration tests focusing on network infrastructure devices to identify and remediate similar vulnerabilities proactively. 7. Educate network administrators about the risks of buffer overflow vulnerabilities and the importance of timely patch management for network hardware.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2024-02-01T21:43:11.616Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 699f6d24b7ef31ef0b56e566
Added to database: 2/25/2026, 9:44:04 PM
Last enriched: 2/28/2026, 8:14:54 AM
Last updated: 4/12/2026, 5:06:34 PM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.