vendor:
TL-WR740N
by:
Anish Feroz (Zeroxinn)
7.5
CVSS
HIGH
Authenticated Directory Transversal
22
CWE
Product Name: TL-WR740N
Affected Version From: TP-Link TL-WR740n 3.12.11 Build 110915 Rel.40896n
Affected Version To: TP-Link TL-WR740n 3.12.11 Build 110915 Rel.40896n
Patch Exists: NO
Related CWE:
CPE: h:tp-link:tl-wr740n
Platforms Tested: TP-Link TL-WR740N
2023
TP-Link TL-WR740N – Authenticated Directory Transversal
This exploit allows an authenticated user to access files outside of the intended directory structure on the TP-Link TL-WR740N router. By sending a specially crafted GET request, the attacker can traverse directories and access sensitive files such as the /etc/shadow file, which contains hashed passwords.
Mitigation:
To mitigate this vulnerability, it is recommended to update the router firmware to the latest version provided by the vendor. Additionally, access to sensitive files should be restricted to authorized users only.