### [CVE-2019-5071](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5071) ![](https://img.shields.io/static/v1?label=Product&message=Tenda%20AC9&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen) ### Description An exploitable command injection vulnerability exists in the /goform/WanParameterSetting functionality of Tenda AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Route (AC9V1.0 Firmware V15.03.05.16multiTRU). A specially crafted HTTP POST request can cause a command injection in the DNS1 post parameters, resulting in code execution. An attacker can send HTTP POST request with command to trigger this vulnerability. ### POC #### Reference - https://talosintelligence.com/vulnerability_reports/TALOS-2019-0861 #### Github No PoCs found on GitHub currently.