Sensitive Information Leakage vulnerability still exists after upgrade of TP-LINK router 2015 in TL-WR842N

Source: Internet
Author: User

Sensitive Information Leakage vulnerability still exists after upgrade of TP-LINK router 2015 in TL-WR842N

Pulian Technology Co., Ltd. is a network equipment R & D and manufacturing company with nearly 20 years of history. Its products are mainly household and office desktop devices and are widely used. This is a wireless device with superior performance.
WooYun-2015-110062 (wooyun-2015-110062 affected suspected version 2.2.2 BUILD 140819 REL.60025n this vulnerability Affected Version Software Version: 2.3.4 Build 141118 Rel.74025n) vulnerability exposure, the TP-LINK quickly against the previous vulnerability repair and upgrade, however, there is still a slight vulnerability-a configuration information leakage vulnerability.
In order to better solve the problem, this report also submits the awesome CNVD exception information number CNVD-C-2015-25845, which is particularly described here.
This is a good home router. Happy weekend to all engineers.

Vulnerability details:



Attack path: Remote Network

Attack complexity: low

Authentication: no authentication is required

Confidentiality: completely

Integrity: no impact

Availability: no impact











TP-LINK TL-WR842N is a powerful Security Factor of Home Router, test equipment for two, are the same type of the same batch of unseal the latest products.

Software Version: 2.3.4 Build 141118 Rel.74025n

Suspected version number affected by the WooYun-2015-110062
 











1. The following test uses a browser to send a request without logon.



1. Attackers can use attack loads in the LAN direction. 1. Attackers can remotely execute commands and download configuration information.



2. In the master network of the WLAN Network, you can use payload 1 to remotely execute commands and download configuration information.



3. In the WAN network direction, the attacker is suspected to be able to execute two attack loads. The attack is successful but not yet executed.



4. The effective attack load cannot be carried out in the guest network of the WLAN Network.

Due to the existence of the third and fourth cases, the vulnerability is rated as medium-risk Rank5! (I entered 20 here to apologize for the review)





Ii. Effective attack Load

See test code area.





III. The following are the results of the two tests
 

 



Iv. device interface and packaging appearance
 

 

 

 

Solution:

Update firmware

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.