• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
iGuRu

iGuRu

Real-time Technology News. Opinions & Tweaks

  • / news
  • / infosec
  • / tools
  • / tweaks
  • / dummies
  • / opinions
  • / support
home / News / Dangerous bug in TP-Link Archer router - Upgrade immediately

Dangerous bug in TP-Link Archer router - Upgrade immediately

17/12/2019 12:51 by Dimitris

A dangerous bag was found on TP-Link's Archer router, which allows for unauthorized access with no password and with administrator privileges. Anyone who owns such a router should upgrade their device immediately.

tp link archer c5 v4 - Dangerous bug on router TP-Link Archer - Upgrade now

TP-Link has a critical vulnerability in some of their models Archer routers, which could allow intruders to cancel administrator passwords and gain remote control of devices via LAN and Telnet connection.

According to researcher Grzegorz Wypych of IBM X-Force Red, if the attackers send an HTTP request to these routers containing a string of characters greater than the allowed number of bytes, the result will be the user password being completely canceled and replaced with a blank value.

This works despite the built-in validation because it only checks the referent's HTTP headers, allowing the attacker to deceive the router's httpd service, and to recognize the request as valid using the hardcoded value tplinkwifi.net.

Since the only type of users on these routers is the administrator with full root privileges, once the intruders bypass the authentication process, they will automatically receive administrator privileges on the router.

Accordingly, the legitimate user will be locked out and will no longer be able to connect to the router with their passwords. The scenario gets even worse, since even if the router's owner manages with a hardreset and sets a new password on the device, the attackers could again cancel another LAN request.

This defect is considered critical as it may grant unauthorized third party access to the router with administrator privileges. The risk is of course greater in business networks, where routers such as these are used to give Wi-Fi access to guests.

Security fixes available
TP-Link has already released updates to help customers protect their routers from attacks that could abuse this security vulnerability, called CVE-2019-7405.

You can download the security updates for Archer C5 V4, Archer MR200v4, Archer MR6400v4, and Archer MR400v3 routers from the table below.

Brutal TP-Link RouterSecurity update
Archer C5 V4 https://static.tp-link.com/2019/201909/20190917/Archer_C5v4190815.rar
Archer MR200v4 https://static.tp-link.com/2019/201909/20190903/Archer%20MR200(EU)_V4_20190730.zip
Archer MR6400v4 https://static.tp-link.com/2019/201908/20190826/Archer%20MR6400(EU)_V4_20190730.zip
Archer MR400v3 https://static.tp-link.com/2019/201908/20190826/Archer%20MR400(EU)_V3_20190730.zip

 

Dangerous bug in TP-Link Archer router - Upgrade immediately was last modified: 17 December, 2019, 12: 51 mm by Dimitris

Subscribe to our newsletter

no spam

spread the news

  • Facebook
  • Twitter
  • Reddit
  • Printing
  • Email

Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News


Competition: Newstag: admin, Archer, bug:, Password, router, tp-link

You May Also Like

Bruteforce wizard for password cracking
Hide the "Show Password" button on the Edge
Chrome will alert you of weak passwords

About Us Dimitris

Dimitris hates on Mondays .....

Previous Post: « Private.sh New search service with encryption
Next Post: Reset the "Settings" application in Windows 10 iGuRu »

Reader Interactions

Comment Policy:

IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators


Leave your comment
Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

 

 © 2021 · iGuRu.gr · ☢ · Keep It Simple Stupid Genesis theme

about  ·   get in touch  ·  rss  ·  sitemap  ·  cough

loadingCancel
Could not post post - check your email address!
Email verification failed, please try again
Your blog can not post posts via email.