what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

TP-Link TL-WR840N Cross Site Request Forgery

TP-Link TL-WR840N Cross Site Request Forgery
Posted Jan 8, 2015
Authored by Sean Wright

The TP-Link TL-WR840N configuration import suffers from a cross site request forgery vulnerability.

tags | advisory, csrf
advisories | CVE-2014-9510
SHA-256 | 63593b69d72e14eb4a6be0af33ad97949161d5f778c7e9cef4a1c358dcb8f1c3

TP-Link TL-WR840N Cross Site Request Forgery

Change Mirror Download
Classification: //Dell SecureWorks/Confidential - Limited External
Distribution:

############################################################################
# * Title: TP-Link TL-WR840N Configuration Import Cross-Site Request Forgery
(CSRF)
# * Advisory ID: SWRX-2015-001
# * Advisory URL:
http://www.secureworks.com/cyber-threat-intelligence/advisories/SWRX-2015-00
1/
# * Date published: Wednesday, January 7, 2015
# * CVE: CVE-2014-9510
# * CVSS v2 base score: 9.3
# * Date of last update: Wednesday, January 7, 2015
# * Vendors contacted: TP-Link
# * Release mode: Coordinated
# * Discovered by: Sean Wright, Dell SecureWorks
############################################################################

Summary:
TP-Link is a primary provider of networking equipment and wireless products
for small and home offices as well as for small to midsized businesses.
TL-WR840N is a combination wired/wireless router specifically targeted to
small business and home office networking environments. The router's web
administration console contains a cross-site request forgery (CSRF)
vulnerability that allows threat actors to import their own configuration to
the router. An attack could alter any configuration setting on the device.
----------------------------------------------------------------------------
Affected products:
This vulnerability affects TP-Link TL-WR840N v1 (firmware 3.13.27, build
140714 and prior).
----------------------------------------------------------------------------
Vendor information, solutions, and workarounds:
TL-WR840N users should upgrade the router's firmware to 3.13.27, build
141120 or later.
----------------------------------------------------------------------------
Details:
The TP-Link TL-WR840N router provides a web administration console that
enables the device owner to
change the router's configuration. The administration console includes an
option to import an existing
configuration from a binary file, but this feature is vulnerable to CSRF
attacks. A threat actor could use
social engineering to trick a victim into visiting a malicious web page that
exploits the CSRF vulnerability
and imports a malicious configuration file via the router's web
administration console. The attacker
could change any settings on the router, including the firewall settings and
the router's remote
administration capabilities. If the device owner has not changed the default
username and password,
then the attack would not require the victim to log into the router's web
administration console.
----------------------------------------------------------------------------

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close