TP-LINK TL-WR840N v5 00000005 – Cross-Site Scripting

  • 作者: purnendu ghosh
    日期: 2019-05-21
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/46882/
  • # Exploit Title: TL-WR840N v5 00000005
    
    # Date: 5/10/2019
    
    # Exploit Author: purnendu ghosh
    
    # Vendor Homepage: https://www.tp-link.com/
    
    # Software Link: https://www.amazon.in/TP-LINK-TL-WR840N-300Mbps-Wireless-External/dp/B01A0G1J7Q
    
    # Category: Hardware
    
    # Firmware Version:0.9.1 3.16 v0001.0 Build 171211 Rel.58800n
    
    # Hardware Version:TL-WR840N v5 00000005
    
    # Tested on: Windows 10
    
    # CVE :CVE-2019-12195.
    
     
    # Proof Of Concept:
    
    TP-Link TL-WR840N v5 00000005 devices allow XSS via the network name. The attacker must
    log into the router by breaking the password and going to the admin
    login page by THC-HYDRA to get the network name. With an XSS payload,
    the network name changed automatically and the internet connection was
    disconnected. All the users become disconnected from
    the internet.
    
    ------------------------------------------
    
    [Additional Information]
    To ensure your network to be safe from Renaming and internet disconnection.
    
    ------------------------------------------
    
    [Vulnerability Type]
    Cross Site Scripting (XSS)
    
    ------------------------------------------
    
    [Vendor of Product]
    tp-link
    
    ------------------------------------------
    
    [Affected Product Code Base]
    router - TL-WR840N v5 00000005
    
    ------------------------------------------
    
    [Affected Component]
    Wi-Fi network configured through the router
    
    ------------------------------------------
    
    [Attack Type]
    Remote
    
    ------------------------------------------
    
    [Impact Denial of Service]
    true
    
    ------------------------------------------
    
    [Impact Information Disclosure]
    true
    
    ------------------------------------------
    
    [Attack Vectors]
    Logged in to the router by breaking the password and goes to the admin
    login page by THC-HYDRA and got the network name. Using Burp Suite
    professional version 1.7.32 captured the network name and selected XSS
    payload against the name and started attacking .as a result the
    network name changed automatically and internet connection was
    disconnected in the network. All the users become disconnected from
    internet.
    
    ------------------------------------------
    
    [Discoverer]
    purnendu ghosh
    
    [Reference]
    https://www.tp-link.com/us/security