Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-57040 PoC — TP-LINK WR845N 安全漏洞

Source
Associated Vulnerability
Title:TP-LINK WR845N 安全漏洞 (CVE-2024-57040)
Description:TP-LINK WR845N是中国普联(TP-LINK)公司的一款无线路由器。 TP-LINK WR845N存在安全漏洞,该漏洞源于root账户使用了硬编码密码。
Description
CVE-2024-57040 is a security vulnerability found in certain TP-Link TL-WR845N router models. Specifically, it involves a "hardcoded" password for the router's root account. This means a default, unchanging password is built into the router's software.
Readme
# Poc-CVE-2024-57040
CVE-2024-57040 is a security vulnerability found in certain TP-Link TL-WR845N router models. Specifically, it involves a "hardcoded" password for the router's root account. This means a default, unchanging password is built into the router's software.

## Affected Devices:
The vulnerability affects these firmware versions:
* TL-WR845N(UN)_V4_190219
* TL-WR845N(UN)_V4_200909
* TL-WR845N(UN)_V4_201214

## Key Conditions for Exploitation:
* The router must be using its default login credentials.
* If the router's password has been changed from the default, the exploit will not work.
* This means, that the router must be in a factory default state, or have never had the password changed.
File Snapshot

[4.0K] /data/pocs/c57d9cc98690c3ea108740fc4f27c3b89f665158 ├── [3.8K] CVE-2024-57040.py ├── [ 11K] LICENSE └── [ 714] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.