Description
TP-Link TL-WR720N wireless router contains a cross-site request forgery vulnerability that allows attackers to perform unauthorized administrative actions by crafting malicious web requests. Attackers can modify port forwarding rules via VirtualServerRpm.htm or change WiFi security settings via WlanSecurityRpm.htm by tricking authenticated users into visiting attacker-controlled pages.
Problem types
Cross-Site Request Forgery (CSRF)
Product status
Credits
Mans van Someren
References
www.exploit-db.com/exploits/44335 (ExploitDB-44335)
www.tp-link.com/ (Official Product Homepage)
static.tp-link.com/...urces/software/TL-WR720N_V1_130719.zip (Product Reference)
www.vulncheck.com/...ions-csrf-via-administrative-interfaces (VulnCheck Advisory: TP-Link TL-WR720N All Versions CSRF via Administrative Interfaces)