Debugging shell with root privileges in routers TP-Link WR740

Debugging shell with root privileges in routers TP-Link WR740

Posted on Jun 18 2012   |  Plain text version


There is a hidden debugging shell with root privileges in routers TP-Link WR740.


Models: WDR740N, WDR740ND and possibly others
Update: People have been reporting on forums that models WR743ND,WR842ND,WA-901ND,WR941N,WR941ND,WR1043ND,WR2543ND,MR3220,MR3020,WR841N also have access to this root shell.
Firmware version: 3.12.11 Build 111130 Rel.55312n and possibly others
Date: 18/06/2012
Severity: High
Impact: Debugging shell with root privileges.
Attack vector: Local and remote.
Solution: N/A

TP-Link WDR740ND/WDR740N routers have a hidden debugging shell with root privileges that could be abused by attackers.

The username is hard coded in the HTTP server binary and the password cannot be changed from the management interface so the following credentials are almost guaranteed to work:



Using this shell attackers may add malicious routing rules or change configuration files.


Go to http://ip/userRpmNatDebugRpm26525557/linux_cmdline.html and enter the credentials "osteam:5up"

Latest Blog Entries

Belkin Wemo Switch NMap Scripts
Belkin Wemo Switch Smart Plug is a network controlled power outlet. The current firmware version does not requiere authentication to switch the power ON or OFF or to gather information such as nearby wireless networks. Two NMap scripts have been published

Downloading an Application's Entire Source Code Through an Exposed GIT Directory
Website administrators sometimes inadvertently leave an exposed .git directory, from which it is possible to download the entire source code of the web application using just wget and a common server misconfiguration.

credmap: The Credential Mapper
An overview of credmap, an open source penetration testing tool that automates the process of testing for credential reuse. It does so by testing supplied user credentials on known websites and verifies if the password has been reused on any of these.

Latest News

Blackhat EU 2015
Websec participated with two tools at the Blackhat, EU Arsenal held in Amsterdam, NL from the 10-13 of November, 2015. During this event, we introduced our brand new tool "credmap: The Credential Mapper" and also presented an amped-up version of Panoptic.

BSides Vancouver 2015
Websec is proud to announce that we will be attending the 3rd annual edition of BSides Vancouver, a local non-profit information security conference held in the heart of Vancouver, BC on March 16 and 17.