Re: Misfortune Cookie Vulnerability

This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.

Re: Misfortune Cookie Vulnerability

This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.
Re: Misfortune Cookie Vulnerability
Re: Misfortune Cookie Vulnerability
2015-02-17 20:46:59
Region : Argentina

Model : TL-WR1043ND

Hardware Version : V2

Firmware Version :

ISP :


Hello, this post is regarding the query previously raised in this closed thread:
http://forum.tp-link.com/showthread.php?78603-Misfortune-Cookie-vulnerability-reported-for-TP-Link-wireless-routers

TP-link was asked to clarify which models are vulnerable.
Unfortunately, the response is terribly inaccurate, misleading, and plain false (" we confirm it cannot actually attack our modem router"), and seems to originate from a wrong understanding of the response author.

I have personally verified the vulnerability affects several TP-link devices from the published list, over the WAN, available right now on the public IPv4.

The vulnerability leads to complete remote takeover (browsing and controlling the admin interface logged in as admin), and has nothing to do with the rom-0 vulnerability.

Please correct this.
  0      
  0      
#1
Options
1 Reply
impossible to access the administration page
2017-05-10 02:44:01
It was a long process I realised that a rompager error ( "Object Not Found - The requested URL '/' was not found on the RomPager server") was somehow connected to the Misfortune Cookie.
Is now confirmed that Misfortune Cookie affects TP-link models (complete list here
http://mis.fortunecook.ie/misfortune-cookie-suspected-vulnerable.pdf).
The solution is 1) to test if port 7547 is open 2) port forwarding 7547 ( https://www.speedguide.net/port.php?port=7547)
  0  
  0  
#2
Options

Information

Helpful: 0

Views: 566

Replies: 1

Related Articles