A dangerous bag was found in router Archer της TP-Link, το οποίο επιτρέπει την παράνομη είσοδο χωρίς codeaccess and with administrator rights. Those who own such a router should upgrade their device immediately.
TP-Link has a critical one vulnerability in some models of Archer routers, which could allow attackers to override administrator passwords and remotely gain full control of devices over a LAN and connections Telnet.
According to researcher Grzegorz Wypych of IBM X-Force Red, if attackers send these routers an HTTP request containing a character string longer than the allowed number of bytes, the result will be code canceled completely and replaced with a blank value.
This works despite the built-in validation because it only checks the referent's HTTP headers, allowing the attacker to deceive the router's httpd service, and to recognize the request as valid using the hardcoded value tplinkwifi.net.
Since the only type of users on these routers is the Admin με πλήρη δικαιώματα root, μόλις οι εισβολείς παρακάμψουν τη διαδικασία ελέγχου ταυτότητας, θα λάβουν αυτόματα δικαιώματα διαχειριστή στο δρομολογητή.
Accordingly, the legitimate user will be locked out and will no longer be able to connect to the router with their passwords. The scenario gets even worse, since even if the router's owner manages with a hardreset and sets a new password on the device, the attackers could again cancel another LAN request.
This defect is considered critical as it may grant unauthorized third party access to the router with administrator privileges. The risk is of course greater in business networks, where routers such as these are used to give Wi-Fi access to guests.
Security fixes available
TP-Link has already released updates to help customers protect their routers from attacks that could exploit this security vulnerability, which is named CVE-2019-7405 .
You can download the security updates for Archer C5 V4, Archer MR200v4, Archer MR6400v4, and Archer MR400v3 routers from the table below.
Brutal TP-Link Router | Security update |
Archer C5 V4 | https://static.tp-link.com/2019/201909/20190917/Archer_C5v4190815.rar |
Archer MR200v4 | https://static.tp-link.com/2019/201909/20190903/Archer%20MR200(EU)_V4_20190730.zip |
Archer MR6400v4 | https://static.tp-link.com/2019/201908/20190826/Archer%20MR6400(EU)_V4_20190730.zip |
Archer MR400v3 | https://static.tp-link.com/2019/201908/20190826/Archer%20MR400(EU)_V3_20190730.zip |
