ID

VAR-E-201808-0279


TITLE

TP-Link TL-WR840N - Denial of Service Vulnerability

Trust: 0.6

sources: EDBNET: 98852

AFFECTED PRODUCTS

vendor:tp linkmodel:tl-wr840nscope: - version: -

Trust: 0.6

sources: EDBNET: 98852

EXPLOIT

# Exploit Title:- TP-Link Wireless N Router WR840N - Denial of Service (PoC)
# Vendor Homepage: https://www.tp-link.com/
# Hardware Link: https://www.amazon.in/TP-LINK-TL-WR840N-300Mbps-Wireless-External/dp/B01A0G1J7Q
# Version: TP-Link Wireless N Router WR840N
# Category: Hardware
# Exploit Author: Aniket Dinda
# Tested on: Windows 10
# Web: https://hackingvila.wordpress.com
# CVE: N/A
# Proof Of Concept:
1- First connect to this network.
2- Open BurpSuite and then start the intercept, making the necessary proxy changes to the internet browser.
3- Go to Quick setup.
4- Now as the Burp is intercept is on, you will find an Authorization: Basic followed by a string.
5- Now we paste a string consisting of 2000 zeros.
6- Then forward the connection.
7- Then your router automatically logout and net connection will be gone.
You have to reboot your router before it becomes available again.

Trust: 0.6

sources: EDBNET: 98852

PRICE

free

Trust: 0.6

sources: EDBNET: 98852

TYPE

Denial of Service Vulnerability

Trust: 0.6

sources: EDBNET: 98852

EXTERNAL IDS

db:0DAYTODAYid:30855

Trust: 0.6

db:EDBNETid:98852

Trust: 0.6

sources: EDBNET: 98852

REFERENCES

url:https://0day.today/exploits/30855

Trust: 0.6

sources: EDBNET: 98852

SOURCES

db:EDBNETid:98852

LAST UPDATE DATE

2022-07-27T10:00:32.739000+00:00


SOURCES RELEASE DATE

db:EDBNETid:98852date:2018-08-09T00:00:00