Page 5 of 22 results (0.005 seconds)

CVSS: 10.0EPSS: 26%CPEs: 4EXPL: 2

An issue was discovered on TP-Link TL-WR840N v5 00000005 0.9.1 3.16 v0001.0 Build 170608 Rel.58696n and TL-WR841N v13 00000013 0.9.1 4.16 v0001.0 Build 170622 Rel.64334n devices. This issue is caused by improper session handling on the /cgi/ folder or a /cgi file. If an attacker sends a header of "Referer: http://192.168.0.1/mainFrame.htm" then no authentication is required for any action. Se ha descubierto un problema en los dispositivos TP-Link TL-WR840N v5 00000005 0.9.1 3.16 v0001.0 Build 170608 Rel.58696n y TL-WR841N v13 00000013 0.9.1 4.16 v0001.0 Build 170622 Rel.64334n. Este problema viene provocado por una gestión incorrecta de sesiones en la carpeta /cgi/ o un archivo /cgi. • http://blog.securelayer7.net/time-to-disable-tp-link-home-wifi-router https://www.exploit-db.com/exploits/44781 • CWE-384: Session Fixation •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0

Cross-site request forgery (CSRF) vulnerability in the administration console in TP-Link TL-WR840N (V1) router with firmware before 3.13.27 build 141120 allows remote attackers to hijack the authentication of administrators for requests that change router settings via a configuration file import. Vulnerabilidad de CSRF en la consola de administración en el router TP-Link TL-WR840N (V1) con firmware anterior a 3.13.27 build 141120 permite a atacantes remotos secuestrar la autenticación de administradores para solicitudes que cambian las configuraciones de routers a través de una importación de un fichero de configuraciones. • http://seclists.org/fulldisclosure/2015/Jan/14 http://www.secureworks.com/cyber-threat-intelligence/advisories/SWRX-2015-001 http://www.securityfocus.com/bid/71913 http://www.tp-link.com/en/support/download/?model=TL-WR840N&version=V1 • CWE-352: Cross-Site Request Forgery (CSRF) •