Vulnerability detection on TP-Link routers allows an attacker to log in without a password
TP-Link has just announced the successful development of a patch for a serious security hole affecting some Archer routers, which could allow potential attackers to control devices through Remote LAN via Telnet connection without having to provide administrator password.
'In the case of a successful exploit, this vulnerability could allow a remote attacker to control the configuration of the router via Telnet on the local area network (LAN) and connect to the FTP server via LAN or WAN ', said security expert Grzegorz Wypych of the IBM X-Force Red team.
To exploit this security vulnerability, an attacker must send an HTTP request that contains a string longer than the number of bytes allowed, resulting in the user password being completely disabled and replaced with a value. hollow.
The built-in authentication is completely 'useless' in this case because it only checks the referrer's HTTP headers, allowing the attacker to mislead the httpd router service that this request is valid by Use hard-coded tplinkwifi.net value.
Vulnerability detection on TP-Link routers allows an attacker to log in without a password Picture 1
The users of these routers are mainly system administrators, who have full root access, so once the threat actors can bypass the authentication process, they will automatically gain administrative privileges. administrator on the router. After that, all processes will be run by this access holder. As such, it can be said that the attacker acted as an administrator and successfully hijacked the device.
"Attackers not only can gain high-level access, but legitimate users will also be blocked and no longer be able to log in to the web service through the regular user interface, resulting in no unable to reset new password ', added Mr. Grzegorz Wypych.
Vulnerability detection on TP-Link routers allows an attacker to log in without a password Picture 2
Worse, even if the router owner sets a new password, an attacker can continue to disable it with a LAN / WAN / CGI request, causing the USB connection to the built-in FTP server to become The only way to access the router. In addition, RSA encryption keys will not be applicable in this case because they do not work with blank passwords.
This vulnerability is being monitored with the identifier CVE-2019-7405, affecting Archer C5 V4, Archer MR200v4, Archer MR6400v4 and Archer MR400v3 routers. TP-Link has released patches to help customers protect their routers from related attacks. As follows:
TP-Link routers are affected by Archer C5 V4 security patchhttps://static.tp-link.com/2019/201909/20190917/Archer_C5v4190815.rarArcher MR200v4https://static.tp-link.com/2019/201909/20190903/Archer%20MR200(EU)_V4_20190730.zipArcher MR6400v4https://static.tp-link.com/2019/201908/20190826/Archer%20MR6400(EU)_V4_20190730.zipArcher MR400v3https://static.tp-link.com/2019/201908/20190826/Archer % 20MR400 (EU) _V3_20190730.zip
You should read it
- Review of TP-LINK Archer C5 router
- TP-Link Archer C80 Review: The basic router offers great speed
- Review TP-Link Archer C50: Cheap router with attractive design
- TP-Link Archer AX6000 review: lightning fast WiFi router
- Top 5 best TP-Link routers today
- TP-Link Archer C7 (AC1750) Review: Excellent Cheap Dual Band Gigabit Router
- 10 best VPN routers 2020
- Guide DTCL Gunner lineup 2
- How to change WiFi Archer C9 password, replace pass WiFi TP Link Archer C9 simple
- Top best 802.11ac Wi-Fi wireless router
- Instructing the Truth Arena Knight Knights formation
- 3 best wireless routers 2021
May be interested
Move the old 1700-ton church with a 256-wheeler truck 5km away
Google Search Android encounters strange errors, automatically escaping when users search for these keyword phrases
Can the iPhone's Night Shift mode be damaging to user health?
Facebook quietly developed its own operating system to abandon Android
The most forgettable technology products in the last decade
Vietnamese hackers collect phone numbers of more than 267 million Facebook users?