TP-Link TL-WR840N v5 00000005 devices allow XSS via the network name. The attacker must log into the router by breaking the password and going to the admin login page by THC-HYDRA to get the network name. With an XSS payload, the network name changed automatically and the internet connection was disconnected. All the users become disconnected from the internet.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/153027/TP-LINK-TL-WR840N-Cross-Site-Scripting.html | Third Party Advisory VDB Entry |
https://www.tp-link.com/us/security | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-05-24T15:24:45
Updated: 2019-05-24T15:24:45
Reserved: 2019-05-19T00:00:00
Link: CVE-2019-12195
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-05-24T16:29:00.687
Modified: 2019-05-29T13:36:52.793
Link: CVE-2019-12195
JSON object: View
Redhat Information
No data.
CWE