An issue was discovered on TP-Link TL-WR1043ND V2 devices. An attacker can send a cookie in an HTTP authentication packet to the router management web interface, and fully control the router without knowledge of the credentials.
References
Link | Resource |
---|---|
https://github.com/MalFuzzer/Vulnerability-Research/blob/master/TL-WR1043ND%20V2%20-%20TP-LINK/TL-WR1043ND_PoC.pdf | Exploit Third Party Advisory |
https://twitter.com/MalFuzzer/status/1141269335685652480?s=19 | Exploit Third Party Advisory |
https://github.com/MalFuzzer/Vulnerability-Research/blob/master/TL-WR1043ND%20V2%20-%20TP-LINK/TL-WR1043ND_PoC.pdf | Exploit Third Party Advisory |
https://twitter.com/MalFuzzer/status/1141269335685652480?s=19 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2019-06-19 15:15
Updated : 2024-11-21 04:47
NVD link : CVE-2019-6971
Mitre link : CVE-2019-6971
CVE.ORG link : CVE-2019-6971
JSON object : View
Products Affected
tp-link
- tl-wr1043nd
- tl-wr1043nd_firmware
CWE