vendor:
                    TL-WR740N
                by:
                    Syed Affan Ahmed (ZEROXINN)
                6.1
                        CVSS
                    HIGH
                    Directory Traversal
                    22
                        CWE
                    Product Name: TL-WR740N
                    Affected Version From:  3.12.2011
                    Affected Version To:  3.12.11
                    Patch Exists: NO
                    Related CWE: CVE-2023-XXXX (Not an actual CVE, placeholder)
                    CPE:  h:tp-link:tl-wr740n_firmware:3.12.11
                    
							Metasploit: 
							https://www.rapid7.com/db/vulnerabilities/suse-cve-2024-1597/, https://www.rapid7.com/db/vulnerabilities/mediawiki-cve-2024-23174/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2022-43358/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-RHEL9-unaffected/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2022-23504/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-RHEL8-unaffected/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2017-14723/, https://www.rapid7.com/db/vulnerabilities/wordpress-cve-2017-14723/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/red_hat-jboss_eap-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/ibm-http_server-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/apache-httpd-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/hpux-cve-2017-9788/, https://www.rapid7.com/db/?q=placeholder)&type=&page=2, https://www.rapid7.com/db/?q=placeholder)&type=&page=2						
                    Platforms Tested:  TP-Link TL-WR740N
                    2023
                    TP-Link TL-WR740N Unauthenticated Directory Traversal
The exploit allows an unauthenticated user to traverse directories and access sensitive system files like /etc/shadow on TP-Link TL-WR740N version 3.12.11 Build 110915 Rel.40896n. This vulnerability could lead to unauthorized access to critical system information.
Mitigation:
					To mitigate this vulnerability, it is recommended to restrict access to the affected directories and implement proper access controls. Regularly updating to the latest firmware provided by the vendor is also advised.