TP-LINK Router Administrative Web Interface Backdoor Vulnerability
RISK: High Risk
TYPE: Servers - Network Management
A vulnerability has been identified in certain TP-LINK routers, which can be exploited by remote attackers to execute arbitrary code on target system.
Certain TP-LINK routers provide access to an administrative web interface which does not require authentication (start_art.html). Remote attacker can trick such routers to download malware from the attacker's TFTP server, and execute the malware in root user privilege. Remote attacker can execute arbitrary code as a root user.
Note:
- The default setting of the router does not allow WAN access to the administrative web interface.
- Proof of concept code of the attack is publicly available.
- Vendor patch is currently unavailable.
Impact
- Remote Code Execution
System / Technologies affected
- TL-WDR4300
- TL-WR743ND (v1.2 v2.0)
- TL-WR941N
- Other models/versions may also be affected.
Solutions
Note: Vendor patch is currently unavailable.
Workaround:
- Disable WAN access to administrative web interface, e.g. configure WAN remote administration IP address as 0.0.0.0, or other trusted IP addresses.
- Only allow trusted MAC address access administrative web interface in LAN.
Vulnerability Identifier
Source
Related Link
Share with