NG Solution Team
Technology

Are TP-Link routers at risk due to a new zero-day vulnerability?

A critical zero-day vulnerability has been detected in the CWMP implementation of TP-Link routers, posing a significant security risk to thousands of users globally. Discovered in January 2025 through automated taint analysis, the flaw was reported to TP-Link on May 11, but remains unpatched, leaving users vulnerable.

CWMP, or TR-069, is a protocol that enables providers to manage routers remotely. Its complexity and privilege levels make it an appealing target for attackers. Researchers have identified a stack-based buffer overflow in the function that processes SetParameterValues SOAP messages, affecting popular models like the Archer AX10 and AX1500.

The issue arises from external message input being used to calculate buffer length, which is then passed to a strncpy operation without boundary checks, despite the stack buffer being only 3072 bytes. With a 4096-byte payload, the exploit crashes the service and allows for the program counter to be overwritten, potentially leading to a full system compromise with root access.

Testing with a proof-of-concept demonstrated that a specially crafted payload could fully control the program counter, confirming the remote code execution scenario. The vulnerability is not limited to just two models, as TP-Link often reuses identical binaries across devices. The Fofa search engine has identified over 4,200 vulnerable devices accessible online, highlighting the real and immediate threat.

The attack’s ease of execution further exacerbates the danger. Many routers still use default passwords or have weak security settings. Once attackers gain access, they can change the CWMP server address to a malicious ACS server, delivering exploits for complete device takeover. The simplicity of setting up such a server and poor certificate validation increase the likelihood of active exploitation.

Despite the vulnerability being reported in May, it remains unresolved, urging users to take immediate precautions. Until patches are available, users are advised to set strong passwords, disable TR-069 if possible, and monitor network activity closely to mitigate risks.

Related posts

How Are Orange Liberia and ZTE Transforming Rural Connectivity in Liberia?

Emily Brown

What are the top Adobe Acrobat alternatives for PDF editing?

David Jones

Is there an active exploitation of a zero-day XSS vulnerability in Zimbra Collaboration Suite?

Michael Johnson

Leave a Comment

This website uses cookies to improve your experience. We assume you agree, but you can opt out if you wish. Accept More Info

Privacy & Cookies Policy