Dangerous bug in TP-Link Archer router - Upgrade immediately

A dangerous bag was found on TP-Link's Archer router, which allows for unauthorized access with no password and with administrator privileges. Anyone who owns such a router should upgrade their device immediately.

TP-Link has a critical vulnerability in some of their models Archer routers, which could allow intruders to cancel administrator passwords and gain remote control of devices via LAN and Telnet connection.

According to researcher Grzegorz Wypych of IBM X-Force Red, if the attackers send an HTTP request to these routers containing a string of characters greater than the allowed number of bytes, the result will be the user password being completely canceled and replaced with a blank value.

This works despite the built-in validation because it only checks the referent's HTTP headers, allowing the attacker to deceive the router's httpd service, and to recognize the request as valid using the hardcoded value tplinkwifi.net.

Since the only type of users on these routers is the with full root privileges once attackers bypass the verification process , they will automatically get admin rights on the router.

Accordingly, the legal he will be locked out and will no longer be able to log into the router with his passwords. The scenario gets even worse, since even if the owner of the router succeeds with a hardreset and sets a new password on the device, attackers could still override it with another LAN request.

This defect is considered critical as it may grant unauthorized third party access to the router with administrator privileges. The risk is of course greater in business networks, where routers such as these are used to give Wi-Fi access to guests.

Security fixes available
TP-Link has already released updates to help customers protect their routers from attacks that could abuse this security vulnerability, called CVE-2019-7405.

Can you do of the security updates for the Archer C5 V4, Archer MR200v4, Archer MR6400v4 and Archer MR400v3 routers from the table below.

Brutal TP-Link Router Security update
Archer C5 V4  https://static.tp-link.com/2019/201909/20190917/Archer_C5v4190815.rar
Archer MR200v4  https://static.tp-link.com/2019/201909/20190903/Archer%20MR200(EU)_V4_20190730.zip
Archer MR6400v4  https://static.tp-link.com/2019/201908/20190826/Archer%20MR6400(EU)_V4_20190730.zip
Archer MR400v3  https://static.tp-link.com/2019/201908/20190826/Archer%20MR400(EU)_V3_20190730.zip

 

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).