CVE-2023-36498

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary commands on the TP-Link ER7206 Omada Gigabit VPN Router via a post-authentication command injection in the PPTP client functionality. Exploitation can lead to gaining an unrestricted shell, potentially compromising the router and network. Only users of the specific TP-Link router model and version are affected.

💻 Affected Systems

Products:
  • TP-Link ER7206 Omada Gigabit VPN Router
Versions: 1.3.0 build 20230322 Rel.70591
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires PPTP client functionality and authenticated access; other TP-Link models or versions may not be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full control of the router, enabling network pivoting, data interception, or deployment of persistent malware across the network.

🟠

Likely Case

An authenticated attacker (e.g., a compromised user account) executes commands to disrupt services, steal credentials, or modify router settings.

🟢

If Mitigated

With strong authentication and network segmentation, impact is limited to the router itself, preventing lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated HTTP requests; no public proof-of-concept is known as of the provided references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not provided in references; check TP-Link security advisories.

Restart Required: Yes

Instructions:

1. Monitor TP-Link for a firmware update. 2. Download the update from the official TP-Link support site. 3. Log into the router's admin interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and apply the new firmware. 6. Reboot the router.

🔧 Temporary Workarounds

Disable PPTP Client

all

Turn off the PPTP client functionality to remove the attack vector.

Log into router admin, navigate to VPN > PPTP Client, and disable it.

Restrict Admin Access

all

Limit administrative access to trusted IP addresses only.

Configure firewall rules on the router to allow admin access from specific IPs.

🧯 If You Can't Patch

  • Isolate the router in a segmented network to limit potential lateral movement.
  • Implement strong authentication policies and monitor for unusual admin activity.

🔍 How to Verify

Check if Vulnerable:

Check the router firmware version via the admin interface under System Tools > Firmware Upgrade.

Check Version:

Log into router admin and view the firmware version on the status page.

Verify Fix Applied:

After updating, confirm the version is no longer 1.3.0 build 20230322 Rel.70591 and test PPTP client functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to PPTP-related endpoints, unexpected command execution logs in system logs.

Network Indicators:

  • Suspicious outbound connections from the router, anomalous traffic patterns post-authentication.

SIEM Query:

Search for HTTP POST requests containing shell metacharacters (e.g., ;, |, &) to router IP on admin ports.

🔗 References

📤 Share & Export