Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-11714 PoC — TP-Link TL-WR840N和TL-WR841N 安全漏洞

Source
Associated Vulnerability
Title:TP-Link TL-WR840N和TL-WR841N 安全漏洞 (CVE-2018-11714)
Description:TP-Link TL-WR840N和TL-WR841N都是中国普联(TP-LINK)公司的无线路由器产品。 TP-Link TL-WR840N和TL-WR841N中存在安全漏洞,该漏洞源于程序没有正确的处理会话。攻击者可利用该漏洞执行任意操作。以下产品和版本受到影响:TP-Link TL-WR840N v5 00000005 0.9.1 3.16 v0001.0 Build 170608 Rel.58696n版本;TL-WR841N v13 00000013 0.9.1 4.16 v0001.0 Buil
Description
An issue was discovered on TP-Link TL-WR840N. This issue is caused by improper session handling on the /cgi/ folder or a /cgi file. If an attacker sends a header of "Referer: http://192.168.0.1/mainFrame.htm" then no authentication is required for any action.
Readme
# cve-2018-11714_POC
An issue was discovered on TP-Link TL-WR840N. This issue is caused by improper session handling on the /cgi/ folder or a /cgi file. If an attacker sends a header of "Referer: http://192.168.0.1/mainFrame.htm" then no authentication is required for any action.


artigo [pt-br]: https://nous.sidneypepo.com/router2025.html
File Snapshot

[4.0K] /data/pocs/242e522b44224c083a31ae090137ca49b4885501 ├── [ 926] poc.py └── [ 343] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.