vendor:
TL-WR720N 150Mbps Wireless N Router
by:
Mans van Someren
8.8
CVSS
HIGH
Cross-Site Request Forgery (CSRF)
352
CWE
Product Name: TL-WR720N 150Mbps Wireless N Router
Affected Version From: All versions
Affected Version To: All versions
Patch Exists: NO
Related CWE: N/A
CPE: h:tp-link:tl-wr720n
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Google Chrome - Windows 10
2018
TL-WR720N 150Mbps Wireless N Router – CSRF
This exploit is a proof-of-concept for port forwarding and changing the WiFi password on the TL-WR720N 150Mbps Wireless N Router. It is vulnerable to CSRF, meaning that any action on the router can be triggered by an attacker. The exploit code loops through a list of router hosts and ports, and calls the portforward and change_wifi_pass functions to perform the malicious actions.
Mitigation:
Implement CSRF protection on the router, such as using tokens or other methods to verify the authenticity of requests.