CVE-2024-46486

TP-LINK TL-WDR5620 v2.3 was discovered to contain a remote code execution (RCE) vulnerability via the httpProcDataSrv function.
References
Link Resource
https://github.com/fishykz/TP-POC Exploit Third Party Advisory
https://yuhehe88.github.io/2024/09/04/TL-WDR5620-Gigabit-Edition-v2-3/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tl-wdr5620_firmware:2.3:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wdr5620:-:*:*:*:*:*:*:*

History

03 Jul 2025, 13:52

Type Values Removed Values Added
CPE cpe:2.3:o:tp-link:tl-wdr5620_firmware:2.3:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wdr5620:-:*:*:*:*:*:*:*
References () https://github.com/fishykz/TP-POC - () https://github.com/fishykz/TP-POC - Exploit, Third Party Advisory
References () https://yuhehe88.github.io/2024/09/04/TL-WDR5620-Gigabit-Edition-v2-3/ - () https://yuhehe88.github.io/2024/09/04/TL-WDR5620-Gigabit-Edition-v2-3/ - Exploit, Third Party Advisory
First Time Tp-link tl-wdr5620
Tp-link tl-wdr5620 Firmware
Tp-link

Information

Published : 2024-10-04 17:15

Updated : 2025-07-03 13:52


NVD link : CVE-2024-46486

Mitre link : CVE-2024-46486

CVE.ORG link : CVE-2024-46486


JSON object : View

Products Affected

tp-link

  • tl-wdr5620_firmware
  • tl-wdr5620
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')