header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

TP-LINK TL-WR740N – Multiple HTML Injection Vulnerabilities

The TP-LINK TL-WR740N router with version 3.12.11 Build 110915 Rel.40896n is vulnerable to multiple HTML injection issues. An attacker can inject malicious HTML code into the Target Description box under Access control settings, leading to potential cross-site scripting (XSS) attacks.

TP-Link TL-WR740N Unauthenticated Directory Traversal

The exploit allows an attacker to access sensitive files like /etc/shadow on TP-Link TL-WR740N routers with firmware version 3.12.11 Build 110915 Rel.40896n. This can lead to unauthorized access and potential compromise of the device. This vulnerability has not been assigned a CVE yet.

TP-LINK TL-WR740N – Multiple HTML Injection Vulnerabilities

The TP-LINK TL-WR740N router version 3.12.11 Build 110915 Rel.40896n is vulnerable to multiple HTML injection issues. By inserting HTML code like <h1>Hello<h1> into the Target Description box under Access control settings, an attacker can inject arbitrary HTML code into the webpage.

TP-Link TL-WR740N Unauthenticated Directory Traversal

The exploit allows an unauthenticated user to traverse directories and access sensitive system files like /etc/shadow on TP-Link TL-WR740N version 3.12.11 Build 110915 Rel.40896n. This vulnerability could lead to unauthorized access to critical system information.

TP-Link TL-WR740N Buffer Overflow DoS Vulnerability

A buffer overflow vulnerability exists in TP-Link TL-WR740 router, allowing attackers to crash the web server by sending a specially crafted request. Rebooting the router is required to restore the web server functionality.

TP-Link TL-WR740N – Authenticated Directory Transversal

This exploit allows an authenticated user to access files outside of the intended directory structure on the TP-Link TL-WR740N router. By sending a specially crafted GET request, the attacker can traverse directories and access sensitive files such as the /etc/shadow file, which contains hashed passwords.

TP-LINK TL-WR740N HTML-injection Vulnerability

TP-LINK TL-WR740N is prone to an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied data. Attacker-supplied HTML or script code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and control how the site is rendered to the user; other attacks are also possible. To exploit this vulnerability, an attacker can send a specially crafted HTTP request containing malicious HTML or script code to the vulnerable device.

XSS Vuln – TP-LINK TL-WR740N

A Cross-site scripting (XSS) vulnerability exists in TP-LINK TL-WR740N. An attacker can exploit this vulnerability by entering malicious code in the Description field of the Wireless MAC Filtering tab, which will be executed when the page is loaded.

Recent Exploits: