Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5228: CWE-122: Heap-based Buffer Overflow in TP-Link Omada ER605

0
High
VulnerabilityCVE-2024-5228cvecve-2024-5228cwe-122
Published: Thu May 23 2024 (05/23/2024, 21:55:55 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link
Product: Omada ER605

Description

TP-Link Omada ER605 Comexe DDNS Response Handling Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service. The specific flaw exists within the handling of DNS responses. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22383.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 00:20:27 UTC

Technical Analysis

CVE-2024-5228 is a heap-based buffer overflow vulnerability identified in the TP-Link Omada ER605 router's handling of Comexe DDNS responses. The vulnerability stems from a lack of proper length validation when processing DNS response data, allowing an attacker to overflow a fixed-length heap buffer. This flaw enables remote code execution (RCE) with root privileges, as the attacker can inject and execute arbitrary code on the device. The attack vector is network-adjacent, meaning the attacker must be able to send crafted DNS responses to the device, but no authentication or user interaction is required. The vulnerability is specifically triggered only if the device is configured to use the Comexe DDNS service, limiting the affected population to those with this feature enabled. The CVSS v3.0 base score is 7.5, reflecting high severity due to the potential for complete system compromise. The vulnerability was assigned by ZDI as ZDI-CAN-22383 and publicly disclosed on May 23, 2024. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. The affected firmware version is 2.6_2.2.2 Build 20231017. The root cause is classified under CWE-122 (Heap-based Buffer Overflow), a common and dangerous software flaw that can lead to arbitrary code execution and system takeover.

Potential Impact

The impact of CVE-2024-5228 is significant for organizations using the TP-Link Omada ER605 routers with Comexe DDNS enabled. Successful exploitation allows attackers to execute arbitrary code with root privileges remotely, potentially leading to full device compromise. This can result in unauthorized access to internal networks, interception or manipulation of network traffic, disruption of network services, and use of the compromised router as a foothold for further attacks. Confidentiality, integrity, and availability of network communications are all at risk. Given that authentication is not required, the attack surface is broad for network-adjacent attackers, increasing the likelihood of exploitation in poorly segmented or exposed network environments. The vulnerability could be leveraged for espionage, data theft, or launching attacks against connected systems. Although no active exploits are known, the high severity and ease of exploitation without authentication make this a critical risk for affected deployments.

Mitigation Recommendations

To mitigate CVE-2024-5228, organizations should first verify if their TP-Link Omada ER605 routers are running the affected firmware version 2.6_2.2.2 Build 20231017 and whether the Comexe DDNS service is enabled. If Comexe DDNS is not required, disabling this feature immediately reduces exposure. If the service is necessary, organizations should monitor TP-Link advisories closely for official patches or firmware updates addressing this vulnerability and apply them promptly once available. In the interim, network segmentation should be enforced to restrict access to the router's management and DDNS services only to trusted internal hosts. Deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting anomalous DNS response patterns may help detect exploitation attempts. Additionally, organizations should audit router configurations and logs for suspicious activity and consider implementing network-level controls to limit exposure to network-adjacent attackers. Regular backups of router configurations and a tested incident response plan are recommended to ensure rapid recovery if compromise occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-05-22T20:22:19.958Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6be0b7ef31ef0b55bb77

Added to database: 2/25/2026, 9:38:40 PM

Last enriched: 2/28/2026, 12:20:27 AM

Last updated: 4/12/2026, 3:43:14 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses