Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-8423 PoC — TP-Link TL-WR841N 缓冲区错误漏洞

Source
Associated Vulnerability
Title:TP-Link TL-WR841N 缓冲区错误漏洞 (CVE-2020-8423)
Description:A buffer overflow in the httpd daemon on TP-Link TL-WR841N V10 (firmware version 3.16.9) devices allows an authenticated remote attacker to execute arbitrary code via a GET request to the page for the configuration of the Wi-Fi network.
Description
Research based on https://ktln2.org/2020/03/29/exploiting-mips-router/#testing-environment
Readme
# CVE-2020-8423
Research based on https://ktln2.org/2020/03/29/exploiting-mips-router/#testing-environment
hook.c is customized (especially open())
vmlinux version 2.6.31
File Snapshot

[4.0K] /data/pocs/c789b4106205d60691dcef189030a0b1f0b6d19d ├── [ 210] cmd.txt ├── [ 13K] hook.c ├── [8.4K] hook.so ├── [ 171] README.md ├── [3.4M] TL-WR841N_V10_150310.zip └── [4.9M] vmlinux 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →