DB: 2016-09-13

1 new exploits

Too many to list!
This commit is contained in:
Offensive Security 2016-09-13 05:08:52 +00:00
parent 79d7b397e6
commit 28e25eeea1
3 changed files with 2538 additions and 1434 deletions

2859
files.csv

File diff suppressed because it is too large Load diff

View file

@ -1,15 +1,13 @@
# Exploit Title: TP-Link TL-WR740N v4 router (FW-Ver. 3.16.6 Build
130529 Rel.47286n) arbitrary shell command execution
# Exploit Title: TP-Link TL-WR740N v4 router (FW-Ver. 3.16.6 Build 130529 Rel.47286n) arbitrary shell command execution
# Date: 08/03/2014
# Exploit Author: Christoph Kuhl
# Vendor Homepage: http://www.tp-link.com
# Software Link:
http://www.tp-link.com.de/resources/software/TL-WR740N_V4_130529.zip
# Software Link: http://www.tp-link.com.de/resources/software/TL-WR740N_V4_130529.zip
# Version: FW-Ver. 3.16.6 Build 130529 Rel.47286n
# Tested on: TP-Link TL-WR740N v4
Exploit:
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/34254.7z
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/34254.7z (Password: TP-P0wned-Link)
Vulnerability description:
The domain name parameters of the "Parental Control" and "Access

1105
platforms/linux/local/40360.txt Executable file

File diff suppressed because it is too large Load diff