8

[webapps] TP-LINK TL-WR740N - Multiple HTML Injection

 7 months ago
source link: https://www.exploit-db.com/exploits/51769
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

TP-LINK TL-WR740N - Multiple HTML Injection

EDB-ID:

51769

EDB Verified:

Platform:

Hardware

Date:

2024-02-02

Vulnerable App:

# Exploit Title: TP-LINK TL-WR740N - Multiple HTML Injection Vulnerabilities
# Date: 25/9/2023
# Exploit Author: Shujaat Amin (ZEROXINN)
# Vendor Homepage: http://www.tp-link.com 
# Version: TP-Link TL-WR740n 3.12.11 Build 110915 Rel.40896n
# Tested on: Windows 10

---------------------------POC-----------------------------

1) Go to your routers IP (192.168.0.1)

2) Go to Access control --> Target,rule

3) Click on add new 

5) Type <h1>Hello<h1> in Target Description box

6) Click on Save, and now you can see html injection on the webpage
            

About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK