var-201807-1265
Vulnerability from variot
CSRF exists for all actions in the web interface on TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n devices. TP-Link TL-WR841N Contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The TP-LinkTL-WR841Nv13 is a wireless router device. TP-LinkTL-WR841Nv13 has a cross-site request forgery vulnerability, and an attacker can perform arbitrary operations on behalf of the authenticated user. * Vulnerability: Cross-Site Request Forgery * Affected Software: TP-Link TL-WR841N v13 * Affected Version: 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n * Patched Version: None * Risk: High * Vendor Contacted: 05/20/2018 * Vendor Fix: None * Public Disclosure: 06/27/2018
Overview
The web interface of the router is vulnerable to CSRF.
CVSS
High 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
The protection mechanism that is in place against CSRF checks if the given "referer" header starts with "192.168.0.1". If it does, the request is accepted.
An attacker can bypass this mechanism by prepending their domain with this string. For example, the malicious HTML and JavaScript code could be hosted at "192.168.0.1.example.com". Alternatively, an attack could originate from a different IP in the internal network, eg "192.168.0.11".
Proof of Concept
Enable remote access:
<html>
<body>
<form action="http://192.168.0.1/cgi?2&2" method="POST"
enctype="text/plain">