TP-Link TL-WR840N v5 00000005 devices allow XSS via the network name. The attacker must log into the router by breaking the password and going to the admin login page by THC-HYDRA to get the network name. With an XSS payload, the network name changed automatically and the internet connection was disconnected. All the users become disconnected from the internet.
References
Link | Resource |
---|---|
https://www.tp-link.com/us/security | Vendor Advisory |
http://packetstormsecurity.com/files/153027/TP-LINK-TL-WR840N-Cross-Site-Scripting.html | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2019-05-24 09:29
Updated : 2019-05-29 06:36
NVD link : CVE-2019-12195
Mitre link : CVE-2019-12195
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
tp-link
- tl-wr840n
- tl-wr840n_firmware