Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Red Hot Cyber Academy

Zero-day vulnerability affecting TP-Link routers: what to know until the patch is released

Redazione RHC : 5 September 2025 16:39

A new zero-day vulnerability has been discovered affecting several TP-Link router models. The issue, identified as a buffer overflow in the CPE WAN Management Protocol (CWMP) implementation, could allow an attacker to execute arbitrary code and redirect DNS requests to rogue servers.

The vulnerability was reported by an independent researcher known by the handle Mehrun (ByteRay) on May 11, 2024. TP-Link has confirmed the existence of the flaw and is working on updates to address the issue. Currently, the fix is only available for European firmware versions; the rollout for the US and other regions is ongoing.

The vulnerability resides in the SOAP SetParameterValues message processing function, where strncpy calls are executed without checking for bounds. This could lead to the possibility of arbitrary code execution if the input buffer size exceeds 3072 bytes. A real-world attack can be implemented by replacing the CWMP server and transmitting a specially crafted SOAP request.

If successfully exploited, the vulnerability can redirect DNS requests to rogue servers, silently intercept or modify unencrypted traffic, and inject malicious data into user sessions. Vulnerable router models include the Archer AX10 and Archer AX1500, which are still on sale and very popular.

TP-Link recommends users change factory administrator passwords, disable CWMP if not in use, update the firmware to the latest version, and, if possible, isolate the router from network segments. critics.

Redazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli