{"id":216344,"date":"2019-03-29T17:38:03","date_gmt":"2019-03-29T16:38:03","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=216344"},"modified":"2022-05-16T19:06:31","modified_gmt":"2022-05-16T17:06:31","slug":"0-day-schwachstelle-in-tp-link-sr20-router","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2019\/03\/29\/0-day-schwachstelle-in-tp-link-sr20-router\/","title":{"rendered":"0-day Schwachstelle in TP-Link SR20-Router"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\"\/>Im TP-Link SR20 SmartHome-Router gibt es eine 0-Day-Sicherheitsl\u00fccke, die eine Arbitrary Code Execution (ACE) erm\u00f6glicht. <\/p>\n<p><!--more--><\/p>\n<p>Die Schwachstelle wurde von Matthew Garrett, Google Sicherheitsforscher, offen gelegt. Die 0-day-(ACE)-Schwachstelle im TP-Link SR20 Smart Home Router erm\u00f6glicht es potenziellen Angreifern im gleichen Netzwerk beliebige Befehle auszuf\u00fchren. Hier der Tweet mit der Erw\u00e4hnung.<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"de\">\n<p lang=\"en\" dir=\"ltr\">It's been over 90 days since I reported it and <a href=\"https:\/\/twitter.com\/TPLINK?ref_src=twsrc%5Etfw\">@TPLINK<\/a> never responded, so: arbitrary command execution on the TP-Link SR20 smart hub and router (and possibly other TP-Link device)<\/p>\n<p>\u2014 Matthew Garrett (@mjg59) <a href=\"https:\/\/twitter.com\/mjg59\/status\/1111106885736787975?ref_src=twsrc%5Etfw\">28. M\u00e4rz 2019<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>  <\/p>\n<p>Die Offenlegung erfolgte, nachdem TP-Link sich 90 Tage nach Meldung der Schwachstelle nicht ger\u00fchrt hat. Inzwischen ist auf coresecurity.com <a href=\"https:\/\/web.archive.org\/web\/20200227212551\/https:\/\/www.coresecurity.com\/advisories\/tp-link-tddp-multiple-vulnerabilities\" target=\"_blank\" rel=\"noopener noreferrer\">ein Advisory<\/a> zum Thema erschienen. Details hat Garrett <a href=\"https:\/\/web.archive.org\/web\/20210119225119\/https:\/\/mjg59.dreamwidth.org\/51672.html\" target=\"_blank\" rel=\"noopener noreferrer\">hier ver\u00f6ffentlicht<\/a> \u2013 Bleeping Computer hat <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/zero-day-tp-link-sr20-router-vulnerability-disclosed-by-google-dev\/\" target=\"_blank\" rel=\"noopener noreferrer\">hier einen Beitrag<\/a> zum Thema.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Im TP-Link SR20 SmartHome-Router gibt es eine 0-Day-Sicherheitsl\u00fccke, die eine Arbitrary Code Execution (ACE) erm\u00f6glicht.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426],"tags":[4328],"class_list":["post-216344","post","type-post","status-publish","format-standard","hentry","category-sicherheit","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/216344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=216344"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/216344\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=216344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=216344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=216344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}