CERT-In Vulnerability Note
CIVN-2019-0202
TP-Link Router Remote Code Execution Vulnerability
Original Issue Date:December 24, 2019
Severity Rating: HIGH
Software Affected
- TP-Link Archer C5 (V4) router
- TP-Link Archer MR 200 (V4) router
- TP-Link Archer MR 6400 (V4) router
- TP-Link Archer MR 400 (V3) router
Overview
A vulnerability has been reported in TP-Link routers which could be exploited by a remote attacker to take complete control of the router.
Description
This vulnerability exists in TP Link routers due to improper handling of HTTP requests. A remote attacker could exploit this vulnerability by sending an HTTP request including a character string longer than the allowed number, resulting in the user password being with a value zero.
Successful exploitation of this vulnerability could allow the attacker to take complete control of the router.
Solution
Apply appropriate updates as mentioned in the following URL:
https://www.tp-link.com/in/support/download/
Vendor Information
TP-Link
https://www.tp-link.com/in/support/download/
References
https://securityintelligence.com/posts/tp-link-archer-router-vulnerability-voids-admin-password-can-allow-remote-takeover/
https://www.bleepingcomputer.com/news/security/tp-link-router-bug-lets-attackers-login-without-passwords/
CVE Name
CVE-2019-7405
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|