TP-LINK TL-WR740N 'ping_addr' Parameter HTML Injection Vulnerability
BID:52424
Info
TP-LINK TL-WR740N 'ping_addr' Parameter HTML Injection Vulnerability
| Bugtraq ID: | 52424 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 12 2012 12:00AM |
| Updated: | Mar 12 2012 12:00AM |
| Credit: | l20ot |
| Vulnerable: |
TP-LINK TL-WR740N 111130 |
| Not Vulnerable: | |
Discussion
TP-LINK TL-WR740N 'ping_addr' Parameter HTML Injection Vulnerability
TP-LINK TL-WR740N is prone to an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied data.
Attacker-supplied HTML or script code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and control how the site is rendered to the user; other attacks are also possible.
TP-LINK TL-WR740N 111130 is vulnerable; other versions may also be affected.
TP-LINK TL-WR740N is prone to an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied data.
Attacker-supplied HTML or script code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and control how the site is rendered to the user; other attacks are also possible.
TP-LINK TL-WR740N 111130 is vulnerable; other versions may also be affected.
Exploit / POC
TP-LINK TL-WR740N 'ping_addr' Parameter HTML Injection Vulnerability
Attackers can use a browser to exploit this issue.
The following example exploit is available:
Attackers can use a browser to exploit this issue.
The following example exploit is available:
References
TP-LINK TL-WR740N 'ping_addr' Parameter HTML Injection Vulnerability
References:
References:
- TP-LINK Homepage (TP-LINK)