An issue was discovered on TP-Link TL-WR1043ND V2 devices. An attacker can send a cookie in an HTTP authentication packet to the router management web interface, and fully control the router without knowledge of the credentials.
References
Link | Resource |
---|---|
https://github.com/MalFuzzer/Vulnerability-Research/blob/master/TL-WR1043ND%20V2%20-%20TP-LINK/TL-WR1043ND_PoC.pdf | Exploit Third Party Advisory |
https://twitter.com/MalFuzzer/status/1141269335685652480?s=19 | Exploit Third Party Advisory |
https://github.com/MalFuzzer/Vulnerability-Research/blob/master/TL-WR1043ND%20V2%20-%20TP-LINK/TL-WR1043ND_PoC.pdf | Exploit Third Party Advisory |
https://twitter.com/MalFuzzer/status/1141269335685652480?s=19 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/MalFuzzer/Vulnerability-Research/blob/master/TL-WR1043ND%20V2%20-%20TP-LINK/TL-WR1043ND_PoC.pdf - Exploit, Third Party Advisory | |
References | () https://twitter.com/MalFuzzer/status/1141269335685652480?s=19 - Exploit, Third Party Advisory |
Information
Published : 2019-06-19 15:15
Updated : 2024-11-21 04:47
NVD link : CVE-2019-6971
Mitre link : CVE-2019-6971
CVE.ORG link : CVE-2019-6971
JSON object : View
Products Affected
tp-link
- tl-wr1043nd_firmware
- tl-wr1043nd
CWE