### [CVE-2019-6487](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6487) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field. ### POC #### Reference - https://github.com/0xcc-Since2016/TP-Link-WDR-Router-Command-injection_POC/blob/master/poc.py #### Github - https://github.com/0xT11/CVE-POC - https://github.com/afang5472/TP-Link-WDR-Router-Command-injection_POC - https://github.com/nomi-sec/PoC-in-GitHub