Unauthenticated stored cross-site scripting (XSS) exists in multiple TP-Link products including WIFI Routers (Wireless AC routers), Access Points, ADSL + DSL Gateways and Routers, which affects TD-W9977v1, TL-WA801NDv5, TL-WA801Nv6, TL-WA802Nv5, and Archer C3150v2 devices through the improper validation of the hostname. Some of the pages including dhcp.htm, networkMap.htm, dhcpClient.htm, qsEdit.htm, and qsReview.htm and use this vulnerable hostname function (setDefaultHostname()) without sanitization.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.tp-link.com | vendor advisory |
https://github.com/smriti548/CVE/blob/main/CVE-2021-3275 | third party advisory exploit |
https://seclists.org/fulldisclosure/2021/Mar/67 | mailing list exploit third party advisory |
http://packetstormsecurity.com/files/161989/TP-Link-Cross-Site-Scripting.html | exploit vdb entry third party advisory |