Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Multiple cross-site request forgery (CSRF) vulnerabilities on the TP-LINK WR1043N router with firmware TL-WR1043ND_V1_120405 allow remote attackers to hijack the authentication of administrators for requests that (1) enable FTP access (aka "FTP directory traversal") to /tmp via the shareEntire parameter to userRpm/NasFtpCfgRpm.htm, (2) change the FTP administrative password via the nas_admin_pwd parameter to userRpm/NasUserAdvRpm.htm, (3) enable FTP on the WAN interface via the internetA parameter to userRpm/NasFtpCfgRpm.htm, (4) launch the FTP service via the startFtp parameter to userRpm/NasFtpCfgRpm.htm, or (5) enable or disable bandwidth limits via the QoSCtrl parameter to userRpm/QoSCfgRpm.htm.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
TP-LINK TL-WR1043N Router 跨站请求伪造漏洞
Vulnerability Description
TP-LINK WR1043N Router是中国普联(TP-LINK)公司的一款无线路由器产品。 使用TL-WR1043ND_V1_120405版本固件的TP-LINK WR1043N路由器中存在跨站请求伪造漏洞。远程攻击者可借助传递到userRpm/NasFtpCfgRpm.htm文件中的‘shareEntire’参数利用该漏洞对/tmp执行FTP访问;借助传递到userRpm/NasUserAdvRpm.htm文件中的‘nas_admin_pwd’参数利用该漏洞修改FTP管理密码;借助传递到user
CVSS Information
N/A
Vulnerability Type
N/A