TP-Link TL-WR841N v13: Broken Authentication (CVE-2018-12575) [High 8.8]
An unauthenticated attacker can send arbitrary requests to CGI scripts,
which allows them to perform all actions an authenticated user could
perform, as well as read out all information that an authenticated user
can read out.
TP-Link TL-WR841N v13: CSRF (CVE-2018-12574) [High 8.8]
The protection mechanism that is in place against CSRF checks if the
given "referer" header starts with "192.168.0.1". If it does, the
request is accepted.
An attacker can bypass this mechanism by prepending their domain with
this string. For example, the malicious HTML and JavaScript code could
be hosted at "192.168.0.1.example.com".
TP-Link TL-WR841N v13: Authenticated Blind Command Injection (CVE-2018-12577) [High 8.7]
The ping and traceroute functionalities accept user input and insert it
into a command without sanitation. An attacker can for example insert
further commands via a semicolon.
(van POC a linkeken)
- Arukereso.hu vélemények száma alapján magyarországon messze a legnépszerűbb routerről van szó
- Shodan.io alapján 158,069 WR841N admin felülete lóg publikus ip-n, az internet felől elérhető módon, ebből 1,738 magyarországi ip-n