routersploit
routersploit copied to clipboard
Add a password reset module for TP-Link Archer routers (CVE-2017-11519)
Description
This module exploits password reset feature on some TP-Link Archer routers by leveraging a predictable random number generator seed.
For more details, see this write-up:
https://devcraft.io/posts/2017/07/21/tp-link-archer-c9-admin-password-reset.html
Based on PoC by William Bowling.
Status
READY
Verification
Provide steps to test or reproduce the PR.
- Start
./rsf.py use exploits/routers/tplink/archer_c9_admin_password_resetset target 192.168.0.1run- admin's password should be reset to 'admin'
Checklist
As I understand it, this project has unfortunately died. It hasn't been updated since 2018 So I created a new branch and merged this PR. My suggestion is as follows: I am ready to store and accept a new PR in one place and merge it here if this project is still alive
As I understand it, this project has unfortunately died. It hasn't been updated since 2018
This is sad news.
Thank you!
can we make your branch the new active one