TP-LINK TD-W8151N Cross Site Request Forgery

2012-10-03 / 2014-03-04
Credit: AkaStep
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-352

===================================================================== Vulnerable Software/Or Device: TP-LINK TD-W8151N 150Mbps Wireless N ADSL+2 modem Router Vendor: http://www.tp-linkru.com/ Vuln: CROSS SITE REQUEST FORGERY (CSRF) How it looks?: http://s52.radikal.ru/i137/1210/47/b60496b61adf.jpg ===================================================================== Tested on Windows XP SP2 (32 bit) Browser: Firefox 15.0.1 ===================================================================== What i can say? I can say only : Nice and Powerfull Device but insecure. This modem Router (TD-W8151N 150Mbps Wireless N ADSL+2 modem Router) is vulnerable to CROSS SITE REQUEST FORGERY vulnerability). Theris no need to change modem password using $_POST request method.(Because $_GET does it for you) $_GET http://LOCAL_IP_ADDRESS/Forms/tools_admin_1 will reset current modem password to empty(blank) password if the current logged user/admin into modem visits malicious page which contains the following "payload". =========CSRF EXPLOIT=================== <img src="http://192.168.1.1/Forms/tools_admin_1"/> =========SAVE IT AS exploit.html============ modem password will be set to empty password. Then attacker only needs to enter: http://_LOCAL_OR_REMOTE_IP_ADDR_OF_VICTIM/ Account name: admin And Password: *LEAVE_IT_EMPTY_I_MEAN_BLANK* Thats all. ===================================================================== SHOUTZ AND GREAT THANKS TO ALL MY FRIENDS: ===================================================================== packetstormsecurity.org packetstormsecurity.com packetstormsecurity.net securityfocus.com cxsecurity.com security.nnov.ru securtiyvulns.com securitylab.ru secunia.com securityhome.eu exploitsdownload.com exploit-db.com osvdb.com to all Aa Team + to all Azerbaijan Black HatZ + *Especially to my bro CAMOUFL4G3.* ===================================================================== /AkaStep

References:

http://s52.radikal.ru/i137/1210/47/b60496b61adf.jpg
http://www.tp-linkru.com/
http://arstechnica.com/security/2014/03/hackers-hijack-300000-plus-wireless-routers-make-malicious-changes/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2017, cxsecurity.com

 

Back to Top