.. / CVE-2015-3035

Exploit for TP-LINK - Local File Inclusion (CVE-2015-3035)

Description:

TP-LINK is susceptible to local file inclusion in these products: Archer C5 (1.2) with firmware before 150317, Archer C7 (2.0) with firmware before 150304, and C8 (1.0) with firmware before 150316, Archer C9 (1.0), TL-WDR3500 (1.0), TL-WDR3600 (1.0), and TL-WDR4300 (1.0) with firmware before 150302, TL-WR740N (5.0) and TL-WR741ND (5.0) with firmware before 150312, and TL-WR841N (9.0), TL-WR841N (10.0), TL-WR841ND (9.0), and TL-WR841ND (10.0) with firmware before 150310. Because of insufficient input validation, arbitrary local files can be disclosed. Files that include passwords and other sensitive information can be accessed.

Nuclei Template

View the template here CVE-2015-3035.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2015/CVE-2015-3035.yaml
Copy

References:

http://www.tp-link.com/en/download/TL-WDR3600_V1.html#Firmware
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150410-0_TP-Link_Unauthenticated_local_file_disclosure_vulnerability_v10.txt
https://nvd.nist.gov/vuln/detail/CVE-2015-3035
http://www.tp-link.com/en/download/Archer-C5_V1.20.html#Firmware
https://seclists.org/fulldisclosure/2015/Apr/26