Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25139: n/a

0
Critical
VulnerabilityCVE-2024-25139cvecve-2024-25139
Published: Thu Mar 14 2024 (03/14/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In TP-Link Omada er605 1.0.1 through (v2.6) 2.2.3, a cloud-brd binary is susceptible to an integer overflow that leads to a heap-based buffer overflow. After heap shaping, an attacker can achieve code execution in the context of the cloud-brd binary that runs at the root level. This is fixed in ER605(UN)_v2_2.2.4 Build 020240119.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:37:03 UTC

Technical Analysis

CVE-2024-25139 is a critical security vulnerability found in TP-Link Omada ER605 routers running firmware versions from 1.0.1 up to 2.2.3. The vulnerability stems from an integer overflow in the cloud-brd binary, a component that runs with root privileges. This integer overflow leads to a heap-based buffer overflow after heap shaping, allowing an attacker to execute arbitrary code within the context of the cloud-brd process. Because this binary runs as root, successful exploitation results in full system compromise, granting the attacker complete control over the device. The vulnerability can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. The flaw is classified under CWE-120 (Classic Buffer Overflow), indicating improper bounds checking on memory operations. The vendor has addressed this issue in firmware version ER605(UN)_v2_2.2.4 Build 020240119. The CVSS v3.1 base score is 10.0, reflecting the vulnerability's critical nature with network attack vector, low attack complexity, no privileges required, no user interaction, and complete impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the severity and ease of exploitation make it a high-priority patch for affected users.

Potential Impact

The impact of CVE-2024-25139 is severe and multifaceted. Successful exploitation allows attackers to execute arbitrary code with root privileges on the TP-Link Omada ER605 device, effectively taking full control of the router. This can lead to complete compromise of the device’s firmware and configuration, enabling attackers to intercept, modify, or redirect network traffic, disrupt network availability, or use the device as a foothold for lateral movement within an organization's network. Confidential data passing through the device can be exposed or manipulated, undermining the confidentiality and integrity of communications. The availability of network services can also be disrupted by malicious payloads or denial-of-service conditions triggered by exploitation. Given that the vulnerability requires no authentication or user interaction and can be exploited remotely, the risk of widespread attacks is significant. Organizations relying on these devices for secure network management and connectivity face critical operational and security risks until the vulnerability is remediated.

Mitigation Recommendations

To mitigate CVE-2024-25139, organizations should immediately upgrade all affected TP-Link Omada ER605 devices to firmware version 2.2.4 or later, where the vulnerability is patched. Network administrators should verify the firmware version on all devices and apply the update as a priority. Until the patch is applied, it is advisable to restrict network access to the management interfaces of the affected devices, ideally limiting access to trusted internal networks or VPNs. Employ network segmentation to isolate critical infrastructure from vulnerable devices. Monitor network traffic for unusual activity that could indicate exploitation attempts, such as unexpected connections to the cloud-brd process or anomalous command execution patterns. Implement intrusion detection and prevention systems (IDS/IPS) with signatures tuned for buffer overflow attempts targeting TP-Link devices. Regularly audit device configurations and logs for signs of compromise. Additionally, maintain an inventory of all network devices to ensure no affected units are overlooked during remediation efforts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-06T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d60b7ef31ef0b570d3d

Added to database: 2/25/2026, 9:45:04 PM

Last enriched: 2/28/2026, 9:37:03 AM

Last updated: 4/12/2026, 5:08:40 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses