The exploit allows an attacker to access sensitive files like /etc/shadow on TP-Link TL-WR740N routers with firmware version 3.12.11 Build 110915 Rel.40896n. This can lead to unauthorized access and potential compromise of the device. This vulnerability has not been assigned a CVE yet.
A buffer overflow vulnerability in TP-Link TL-WR740 router allows attackers to crash the web server by sending a specially crafted request, requiring a physical reboot to restore functionality.
The exploit allows an unauthenticated user to traverse directories and access sensitive system files like /etc/shadow on TP-Link TL-WR740N version 3.12.11 Build 110915 Rel.40896n. This vulnerability could lead to unauthorized access to critical system information.
A buffer overflow vulnerability exists in TP-Link TL-WR740N router, allowing an attacker to crash the web server by sending a specially crafted request. Rebooting the router is necessary to restore the web server functionality.
A buffer overflow vulnerability exists in TP-Link TL-WR740 router, allowing attackers to crash the web server by sending a specially crafted request. Rebooting the router is required to restore the web server functionality.
This exploit allows an authenticated user to access files outside of the intended directory structure on the TP-Link TL-WR740N router. By sending a specially crafted GET request, the attacker can traverse directories and access sensitive files such as the /etc/shadow file, which contains hashed passwords.