DB: 2016-09-13
1 new exploits Too many to list!
This commit is contained in:
parent
79d7b397e6
commit
28e25eeea1
3 changed files with 2538 additions and 1434 deletions
|
@ -1,15 +1,13 @@
|
||||||
# Exploit Title: TP-Link TL-WR740N v4 router (FW-Ver. 3.16.6 Build
|
# Exploit Title: TP-Link TL-WR740N v4 router (FW-Ver. 3.16.6 Build 130529 Rel.47286n) arbitrary shell command execution
|
||||||
130529 Rel.47286n) arbitrary shell command execution
|
|
||||||
# Date: 08/03/2014
|
# Date: 08/03/2014
|
||||||
# Exploit Author: Christoph Kuhl
|
# Exploit Author: Christoph Kuhl
|
||||||
# Vendor Homepage: http://www.tp-link.com
|
# Vendor Homepage: http://www.tp-link.com
|
||||||
# Software Link:
|
# Software Link: http://www.tp-link.com.de/resources/software/TL-WR740N_V4_130529.zip
|
||||||
http://www.tp-link.com.de/resources/software/TL-WR740N_V4_130529.zip
|
|
||||||
# Version: FW-Ver. 3.16.6 Build 130529 Rel.47286n
|
# Version: FW-Ver. 3.16.6 Build 130529 Rel.47286n
|
||||||
# Tested on: TP-Link TL-WR740N v4
|
# Tested on: TP-Link TL-WR740N v4
|
||||||
|
|
||||||
Exploit:
|
Exploit:
|
||||||
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/34254.7z
|
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/34254.7z (Password: TP-P0wned-Link)
|
||||||
|
|
||||||
Vulnerability description:
|
Vulnerability description:
|
||||||
The domain name parameters of the "Parental Control" and "Access
|
The domain name parameters of the "Parental Control" and "Access
|
||||||
|
|
1105
platforms/linux/local/40360.txt
Executable file
1105
platforms/linux/local/40360.txt
Executable file
File diff suppressed because it is too large
Load diff
Loading…
Add table
Reference in a new issue