POC详情: f8d2b4aefeab2339a7d559e4dfb7ddeed5d4e227

来源
关联漏洞
标题: TP-Link wireless router 命令注入漏洞 (CVE-2023-33538)
描述:TP-LINK TL-WR940N是中国普联(TP-LINK)公司的一款无线路由器。 TP-Link wireless router存在安全漏洞,该漏洞源于通过/userRpm/WlanNetworkRpm组件发现包含命令注入漏洞。受影响的产品和版本:TP-Link TL-WR940N V2版本和V4版本,TL-WR841N V8版本和V10版本, TL-WR740N V1版本和V2版本。
描述
CVE-2023-33538 - TP-Link Command Injection Ruby module for Metasploit Framework 
介绍
# CVE-2023-33538 – TP-Link TL-WR940N/841N Command Injection (Metasploit module)

This Metasploit **auxiliary module** targets an authenticated **command injection vulnerability** in TP-Link TL-WR940N V2/V4 and TL-WR841N V8/V10 routers.  
The issue lies in the vulnerable `ssid1` parameter used in `WlanNetworkRpm.htm`, which allows injection of arbitrary shell commands.

When successful, it allows the attacker to execute arbitrary commands on the device.

More information about the CVE:  
https://nvd.nist.gov/vuln/detail/CVE-2023-33538

---

## How to run this module?

1. Copy the `.rb` file into your Metasploit modules folder, for example:

```bash
cp tplink_ssid1_rce.rb/usr/share/metasploit-framework/modules/auxiliary/admin/http/
```

2. Start Metasploit console:

```bash
msfconsole
```

3. Search and use the module:

```bash
search tplink
use auxiliary/admin/http/tplink_ssid1_rce
```

4. Set required options:

```
set RHOSTS 192.168.0.1
set RPORT 80
set AUTHCOOKIE Basic%20YWRtaW46YWRtaW4%3D
set SESSIONPATH /ABCD1234/
set CMD reboot
run
```

> The module **does not** perform authentication. You must manually extract the `Authorization` cookie and session prefix from a successful login to the router's web interface.

---

## References

- https://nvd.nist.gov/vuln/detail/CVE-2023-33538  
- https://web.archive.org/web/20230609111043/https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/3/TL-WR940N_TL-WR841N_userRpm_WlanNetworkRpm_Command_Injection.md

---

## Disclaimer

This module is intended **for educational purposes only**.  
**Do not use this code against devices or infrastructure you do not own or have explicit permission to test.**

---

## Issues 

If you find bugs, or have ideas for improvements – feel free to open an issue or leave a comment. 
文件快照

[4.0K] /data/pocs/f8d2b4aefeab2339a7d559e4dfb7ddeed5d4e227 ├── [1.7K] README.md └── [2.9K] tplink_ssid1_rce.rb 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。