An issue was discovered on TP-Link TL-WR840N v5 00000005 0.9.1 3.16 v0001.0 Build 170608 Rel.58696n and TL-WR841N v13 00000013 0.9.1 4.16 v0001.0 Build 170622 Rel.64334n devices. This issue is caused by improper session handling on the /cgi/ folder or a /cgi file. If an attacker sends a header of "Referer: http://192.168.0.1/mainFrame.htm" then no authentication is required for any action.
References
Link | Resource |
---|---|
http://blog.securelayer7.net/time-to-disable-tp-link-home-wifi-router/ | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/44781/ | Exploit Third Party Advisory VDB Entry |
http://blog.securelayer7.net/time-to-disable-tp-link-home-wifi-router/ | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/44781/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.securelayer7.net/time-to-disable-tp-link-home-wifi-router/ - Exploit, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/44781/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-06-04 14:29
Updated : 2024-11-21 03:43
NVD link : CVE-2018-11714
Mitre link : CVE-2018-11714
CVE.ORG link : CVE-2018-11714
JSON object : View
Products Affected
tp-link
- tl-wr840n_firmware
- tl-wr840n
- tl-wr841n_firmware
- tl-wr841n
CWE
CWE-384
Session Fixation