Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5227: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Omada ER605

0
High
VulnerabilityCVE-2024-5227cvecve-2024-5227cwe-78
Published: Thu May 23 2024 (05/23/2024, 21:55:48 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link
Product: Omada ER605

Description

TP-Link Omada ER605 PPTP VPN username Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are only vulnerable if configured to use a PPTP VPN with LDAP authentication. The specific flaw exists within the handling of the username parameter provided to the /usr/bin/pppd endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22446.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 00:20:07 UTC

Technical Analysis

CVE-2024-5227 is an OS command injection vulnerability identified in the TP-Link Omada ER605 router, specifically in firmware version 2.6_2.2.2 Build 20231017. The vulnerability arises from improper neutralization of special elements in the username parameter submitted to the /usr/bin/pppd endpoint, which handles PPTP VPN connections. When the device is configured to use PPTP VPN with LDAP authentication, the username input is not properly sanitized before being incorporated into a system call, enabling an attacker to inject arbitrary shell commands. This flaw allows a network-adjacent attacker to execute code remotely with root privileges without requiring authentication or user interaction. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command) and was assigned a CVSS v3.0 score of 7.5, reflecting high severity. The attack vector is adjacent network access, and the attack complexity is high due to the need for specific configuration. No public exploits have been reported yet, but the potential for full system compromise is significant given the root-level code execution capability. The vulnerability was reported by the Zero Day Initiative (ZDI) as ZDI-CAN-22446 and published on May 23, 2024.

Potential Impact

The impact of CVE-2024-5227 is substantial for organizations using TP-Link Omada ER605 routers with PPTP VPN and LDAP authentication enabled. Successful exploitation grants attackers root-level remote code execution, allowing them to fully compromise the device. This can lead to unauthorized access to internal networks, interception or manipulation of network traffic, disruption of VPN services, and potential lateral movement to other network assets. Confidentiality is at risk as attackers could exfiltrate sensitive data passing through the VPN. Integrity and availability are also threatened since attackers could modify configurations, implant persistent backdoors, or cause denial of service by destabilizing the device. Given that authentication is not required, the attack surface is broad for network-adjacent adversaries, including insider threats or attackers on the same local network segment. Although exploitation requires the device to be configured with PPTP VPN and LDAP authentication, these configurations are still in use in various enterprise and SMB environments, increasing the scope of affected systems worldwide.

Mitigation Recommendations

To mitigate CVE-2024-5227, organizations should first verify if their TP-Link Omada ER605 devices are configured to use PPTP VPN with LDAP authentication, as this is a prerequisite for exploitation. If so, immediate steps include disabling PPTP VPN or switching to more secure VPN protocols such as OpenVPN or IPsec, which do not exhibit this vulnerability. Network segmentation should be employed to restrict access to the VPN endpoints to trusted hosts only, reducing the attack surface. Monitoring network traffic for unusual activity targeting the /usr/bin/pppd endpoint can help detect exploitation attempts. Since no official patches are currently available, organizations should engage with TP-Link support for updates or advisories. Additionally, implementing strict input validation and command sanitization at the application level is recommended for future firmware updates. Employing intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability can provide additional defense layers. Finally, maintaining an inventory of affected devices and applying firmware updates promptly once released is critical to long-term mitigation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-05-22T20:15:04.846Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6be0b7ef31ef0b55bb74

Added to database: 2/25/2026, 9:38:40 PM

Last enriched: 2/28/2026, 12:20:07 AM

Last updated: 4/12/2026, 6:11:14 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses