DB: 2016-09-13
1 new exploits Too many to list!
This commit is contained in:
parent
79d7b397e6
commit
28e25eeea1
3 changed files with 2538 additions and 1434 deletions
|
@ -1,15 +1,13 @@
|
|||
# Exploit Title: TP-Link TL-WR740N v4 router (FW-Ver. 3.16.6 Build
|
||||
130529 Rel.47286n) arbitrary shell command execution
|
||||
# Exploit Title: TP-Link TL-WR740N v4 router (FW-Ver. 3.16.6 Build 130529 Rel.47286n) arbitrary shell command execution
|
||||
# Date: 08/03/2014
|
||||
# Exploit Author: Christoph Kuhl
|
||||
# Vendor Homepage: http://www.tp-link.com
|
||||
# Software Link:
|
||||
http://www.tp-link.com.de/resources/software/TL-WR740N_V4_130529.zip
|
||||
# Software Link: http://www.tp-link.com.de/resources/software/TL-WR740N_V4_130529.zip
|
||||
# Version: FW-Ver. 3.16.6 Build 130529 Rel.47286n
|
||||
# Tested on: TP-Link TL-WR740N v4
|
||||
|
||||
Exploit:
|
||||
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/34254.7z
|
||||
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/34254.7z (Password: TP-P0wned-Link)
|
||||
|
||||
Vulnerability description:
|
||||
The domain name parameters of the "Parental Control" and "Access
|
||||
|
|
1105
platforms/linux/local/40360.txt
Executable file
1105
platforms/linux/local/40360.txt
Executable file
File diff suppressed because it is too large
Load diff
Loading…
Add table
Reference in a new issue