6/2/2023 0 Comments Tplink ac750 exploitWhen asked, a TP-Link spokesperson said the update was “currently available when requested from tech support,” but wouldn’t explain why. But when we checked, the firmware for WR740N wasn’t available on the website. TP-Link said the vulnerability was quickly patched in both routers. TP-Link released a patch a few weeks later for the vulnerable WR940N router, but Mabbitt warned TP-Link again in January 2018 that another router, TP-Link’s WR740N, was also vulnerable to the same bug because the company reused vulnerable code between devices. cybersecurity firm Fidus Information Security, first discovered and disclosed the remote code execution bug to TP-Link in October 2017. In the worst-case scenario, an attacker could target vulnerable devices on a massive scale, using a similar mechanism to how botnets like Mirai worked - by scouring the web and hijacking routers using default passwords like “admin” and “pass.”Īndrew Mabbitt, founder of U.K. The exploit relies on the router’s default password to work, which many don’t change. ![]() The vulnerability allows any low-skilled attacker to remotely gain full access to an affected router. ![]() ![]() Thousands of TP-Link routers are vulnerable to a bug that can be used to remotely take control of the device, but it took more than a year for the company to publish the patches on its website.
0 Comments
Leave a Reply. |