
9 changes to exploits/shellcodes TP-Link Wireless N Router WR840N - Denial of Service (PoC) Splinterware System Scheduler Pro 5.12 - Privilege Escalation iSmartViewPro 1.5 - 'Device Alias' Buffer Overflow iSmartViewPro 1.5 - 'Account' Buffer Overflow OpenEMR < 5.0.1 - Remote Code Execution Kirby CMS 2.5.12 - Cross-Site Scripting osTicket 1.10.1 - Arbitrary File Upload LG-Ericsson iPECS NMS 30M - Directory Traversal LAMS < 3.1 - Cross-Site Scripting onArcade 2.4.2 - Cross-Site Request Forgery (Add Admin) Monstra 3.0.4 - Cross-Site Scripting LAMS < 3.1 - Cross-Site Scripting onArcade 2.4.2 - Cross-Site Request Forgery (Add Admin) Monstra 3.0.4 - Cross-Site Scripting
22 lines
No EOL
942 B
Text
22 lines
No EOL
942 B
Text
# Exploit Title:- TP-Link Wireless N Router WR840N - Denial of Service (PoC)
|
|
# Date: 2018-08-05
|
|
# Vendor Homepage: https://www.tp-link.com/
|
|
# Hardware Link: https://www.amazon.in/TP-LINK-TL-WR840N-300Mbps-Wireless-External/dp/B01A0G1J7Q
|
|
# Version: TP-Link Wireless N Router WR840N
|
|
# Category: Hardware
|
|
# Exploit Author: Aniket Dinda
|
|
# Tested on: Windows 10
|
|
# Web: https://hackingvila.wordpress.com
|
|
# CVE: N/A
|
|
|
|
# Proof Of Concept:
|
|
|
|
1- First connect to this network.
|
|
2- Open BurpSuite and then start the intercept, making the necessary proxy changes to the internet browser.
|
|
3- Go to Quick setup.
|
|
4- Now as the Burp is intercept is on, you will find an Authorization: Basic followed by a string.
|
|
5- Now we paste a string consisting of 2000 zeros.
|
|
6- Then forward the connection.
|
|
7- Then your router automatically logout and net connection will be gone.
|
|
|
|
You have to reboot your router before it becomes available again. |