First published: Mon Oct 06 2014(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities on the TP-LINK WR1043N router with firmware TL-WR1043ND_V1_120405 allow remote attackers to hijack the authentication of administrators for requests that (1) enable FTP access (aka "FTP directory traversal") to /tmp via the shareEntire parameter to userRpm/NasFtpCfgRpm.htm, (2) change the FTP administrative password via the nas_admin_pwd parameter to userRpm/NasUserAdvRpm.htm, (3) enable FTP on the WAN interface via the internetA parameter to userRpm/NasFtpCfgRpm.htm, (4) launch the FTP service via the startFtp parameter to userRpm/NasFtpCfgRpm.htm, or (5) enable or disable bandwidth limits via the QoSCtrl parameter to userRpm/QoSCfgRpm.htm.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Firmware | =tl-wr1043nd_v1_120405 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2645 is rated as a medium severity vulnerability due to the potential for unauthorized access and control of the TP-LINK WR1043N router.
To mitigate CVE-2013-2645, users should upgrade the router firmware to the latest version available from TP-LINK.
CVE-2013-2645 allows remote attackers to perform cross-site request forgery, potentially compromising the router's admin authentication.
CVE-2013-2645 affects users of the TP-LINK WR1043N router running the firmware version TL-WR1043ND_V1_120405.
Yes, CVE-2013-2645 can be exploited easily through crafted web requests that are sent to the affected router.