Multiple cross-site request forgery (CSRF) vulnerabilities on the TP-LINK WR1043N router with firmware TL-WR1043ND_V1_120405 allow remote attackers to hijack the authentication of administrators for requests that (1) enable FTP access (aka "FTP directory traversal") to /tmp via the shareEntire parameter to userRpm/NasFtpCfgRpm.htm, (2) change the FTP administrative password via the nas_admin_pwd parameter to userRpm/NasUserAdvRpm.htm, (3) enable FTP on the WAN interface via the internetA parameter to userRpm/NasFtpCfgRpm.htm, (4) launch the FTP service via the startFtp parameter to userRpm/NasFtpCfgRpm.htm, or (5) enable or disable bandwidth limits via the QoSCtrl parameter to userRpm/QoSCfgRpm.htm.
References
Configurations
History
21 Nov 2024, 01:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityevaluators.com/knowledge/case_studies/routers/tp-link_wr1043n.php - |
Information
Published : 2014-10-06 01:55
Updated : 2024-11-21 01:52
NVD link : CVE-2013-2645
Mitre link : CVE-2013-2645
CVE.ORG link : CVE-2013-2645
JSON object : View
Products Affected
tp-link
- firmware
CWE
CWE-352
Cross-Site Request Forgery (CSRF)