TP-Link addressed a critical zero-day vulnerability
“This is a zero-day flaw that was not previously reported and can affect both home and business environments.” explained IBM X-Force Red‘s Grzegorz Wypych (aka @horac341). “If exploited, this router vulnerability can allow a remote attacker to take control of the router’s configuration via Telnet on the local area network (LAN) and connect to a File Transfer Protocol (FTP) server through the LAN or wide area network (WAN).”
The flaw could allow unauthorized third-party access to the router with admin privileges without proper authentication.
The flaw could be triggered by an attacker by sending an HTTP request containing a string longer than the expected string length, causing the password to get completely voided and replaced by an empty value.
The expert explained that the Common Gateway Interface (CGI) validation is only based on the referrer’s HTTP headers. This means that if it matches the IP address or the domain associated with
Since TP-Link Archer routers only implement admin user type with root privileges, and all processes run as root, an attacker could operate as admin and take full control over the
The attackers could also lock out legitimate users that will be no more able to log in to the web service of the device.
“In such an event, the victim could lose access to the console and even a shell, and thereby would not be able to re-establish a new password.” continues the post. “Even if there was a way to set a new password, the next vulnerable LAN/WAN/CGI request would, once again, void the password. The only access would, therefore, be FTP files via a USB port connection.”
The experts also pointed out that the RSA encryption key would fail since it is not designed to work with an empty password.
“The risk is greater on business networks where routers such as this can be used to enable guest Wi-Fi. If placed on the enterprise network, a compromised router can become a point of entry to an attacker, and a place to pivot from in recon and lateral movement tactics.” the expert concludes.
TP-Link has already addressed the flaw with the release of the following security patches for Archer C5 V4, Archer MR200v4, Archer MR6400v4, and Archer MR400v3 routers:
Firmware for Archer C5 V4:
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.