header-logo
Suggest Exploit
vendor:
TL-WR740N
by:
SecurityFocus
7,5
CVSS
HIGH
HTML-injection
79
CWE
Product Name: TL-WR740N
Affected Version From: TP-LINK TL-WR740N 111130
Affected Version To: TP-LINK TL-WR740N 111130
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2012

TP-LINK TL-WR740N HTML-injection Vulnerability

TP-LINK TL-WR740N is prone to an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied data. Attacker-supplied HTML or script code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and control how the site is rendered to the user; other attacks are also possible. To exploit this vulnerability, an attacker can send a specially crafted HTTP request containing malicious HTML or script code to the vulnerable device.

Mitigation:

Users should apply the latest available updates from the vendor to mitigate the risk of exploitation.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/52424/info

TP-LINK TL-WR740N is prone to an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied data.

Attacker-supplied HTML or script code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and control how the site is rendered to the user; other attacks are also possible.

TP-LINK TL-WR740N 111130 is vulnerable; other versions may also be affected. 

1. Go to http://www.example.com/maintenance/tools_test.htm
2. make ping like &lt;/textarea&gt;<script>prompt(2)</script>