vendor:
Archer CR-700
by:
Ayushman Dutta
3,1
CVSS
MEDIUM
Cross-Site Scripting (XSS)
79
CWE
Product Name: Archer CR-700
Affected Version From: 1.0.6
Affected Version To: 1.0.6
Patch Exists: YES
Related CWE: N/A
CPE: h:tp-link:archer_cr700
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2016
TP-Link Archer CR-700 XSS vulnerability
Exploiting TP-Link Archer CR-700 Router. On a Linux machine, the user can comment out the line 'send host-name = gethostname();' and change the gethostname() function to an XSS script like '<script>alert(5)</script>'. Then, the user can send a DHCP request to the router to receive an IP address with the command 'dhclient -v -i wlan0'. On logging in, the XSS script executes. Additionally, the router does not have a CSRF token, so the cookie set by the router can be stolen using an XSS script.
Mitigation:
The user should ensure that the gethostname() function is not changed to an XSS script. Additionally, the router should be updated with a CSRF token.