vendor:
TCW690
by:
MurDoK
5.5
CVSS
MEDIUM
Password Validation
287
CWE
Product Name: TCW690
Affected Version From: 2.1
Affected Version To: 2.1
Patch Exists: NO
Related CWE:
CPE: h:thomson:tcw690
Platforms Tested: Linux
2005
Thomson TCW690 POST Password Validation exploit
This exploit allows an attacker to change the password of a Thomson TCW690 router by sending a malicious POST request. The vulnerability was discovered by MurDoK in 2005. The exploit code is written in C and can be compiled and executed on a Linux system. The exploit sends a POST request to the router's /goform/RgSecurity URL with the new password as a parameter. The exploit requires the IP address of the router and the new password as command line arguments. After successful execution, the user is instructed to visit http://192.168.0.1 to confirm the password change.
Mitigation:
To mitigate this vulnerability, it is recommended to update the firmware of the Thomson TCW690 router to the latest version. Additionally, users should ensure that the router's admin interface is not accessible from the internet and change the default password to a strong and unique one.