Skip to main content
Critical June 18, 2012

Debugging shell with root privileges in routers TP-Link WR740

A range of TP-Link WR740 and related models ship with a hidden debug shell running as root. The credentials are hard-coded in the HTTP server binary and cannot be changed, giving attackers reliable root-level access from the local network or, in some cases, remotely.

CVSS Score

9.8 / 10.0

Severity

Critical

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Advisory

VendorTP-Link
ModelsWDR740N, WDR740ND, WR743ND, WR842ND, WA901ND, WR941N, WR941ND, WR1043ND, WR2543ND, MR3220, MR3020, WR841N
Firmware3.12.11 Build 111130 Rel.55312n and possibly others
ImpactHidden debug shell running as root
Attack VectorLocal and remote

Description

TP-Link WDR740ND / WDR740N routers ship with a hidden debugging shell running with root privileges. The username is hard-coded in the HTTP server binary and the password cannot be changed from the management interface, so the built-in credentials are effectively guaranteed to work on every unit.

Proof of Concept

Request the hidden shell page and authenticate with the built-in account:

URL:  /userRpmNatDebugRpm26525557/linux_cmdline.html
User: osteam
Pass: 5up

From this shell, an attacker can add malicious routing rules, modify configuration files, or pivot to the LAN.

Remediation

No vendor fix. Disable WAN-side HTTP administration; replace vulnerable devices.

Share this advisory:

Related Security Advisories

Stay informed about other recent vulnerabilities and security advisories

Critical December 18, 2014

Command Execution and Backdoor in Zhone GPON-2520

This post will describe a backdoor account found in the Zhone GPON-2520 and will provide a PoC which can be used to disable the firewall filtration rules in order to allow access to services such as ssh, telnet and ftp.

Severity:
CVSS: 9.8
View advisory
High May 22, 2014

Huawei HG8245 / HG8247 WPA Generator

Huawei HG8245 & HG8247 ONT (firmware version V1R006C00S100) rely on a weak algorithm to calculate the WPA keys, keys can be predicted easily using the WiFi's MAC Address (BSSID).

Severity:
CVSS: 7.4
View advisory
High December 19, 2013

Arbitrary Command Execution in Alcatel-Lucent I-240W-Q

The Alcatel-Lucent I-240W-Q ONT's Diagnostics page does not filter shell metacharacters in the IP address field, allowing any authenticated administrator to execute arbitrary commands as root and fully compromise the device.

Severity:
CVSS: 8.0
View advisory