TP-Link exploit attempts in the wild

OVERKILL

$100 Site Donor 2021
Joined
Apr 28, 2008
Messages
61,194
Location
Ontario, Canada
I often see a dismissive tone taken by certain people about the risk of their consumer-grade equipment actually getting targeted/attacked in the wild. Things like "I'm not worth the time" or "I'm not a big enough target", despite me explaining that this is mostly automated, performed by bots. High value targets may be worth personal investment time, but opportunistic targets; targets located by bots that can be automatically exploited don't require that initial time investment, which makes them worthwhile.

Here's a Meraki MX summary from a site I manage. Note that three times a TP-Link Archer Router command injection attempt was made against this piece of equipment (which isn't vulnerable).
Screenshot 2024-06-20 131041.webp


Here's the details in the advisory:
https://www.zerodayinitiative.com/advisories/ZDI-23-451/

It was reported to TP-Link in January of 2023 but the advisory wasn't released to the public until April. TP-Link didn't release updated firmware until the end of June.

If Auto Update isn't enabled on the device (it's not enabled by default) then you would have had to have been aware of the, advisory, the release of the update, and then manually performed the upgrade, to not be vulnerable to it, which is why bots are trying to actively exploit it a year later.
 
I often see a dismissive tone taken by certain people about the risk of their consumer-grade equipment actually getting targeted/attacked in the wild. Things like "I'm not worth the time" or "I'm not a big enough target", despite me explaining that this is mostly automated, performed by bots. High value targets may be worth personal investment time, but opportunistic targets; targets located by bots that can be automatically exploited don't require that initial time investment, which makes them worthwhile.

Here's a Meraki MX summary from a site I manage. Note that three times a TP-Link Archer Router command injection attempt was made against this piece of equipment (which isn't vulnerable).
View attachment 226025

Here's the details in the advisory:
https://www.zerodayinitiative.com/advisories/ZDI-23-451/

It was reported to TP-Link in January of 2023 but the advisory wasn't released to the public until April. TP-Link didn't release updated firmware until the end of June.

If Auto Update isn't enabled on the device (it's not enabled by default) then you would have had to have been aware of the, advisory, the release of the update, and then manually performed the upgrade, to not be vulnerable to it, which is why bots are trying to actively exploit it a year later.
I like that ATT pushes firmware updates to my router.
 
It’s a bummer that TP-Link has these issues, because otherwise I really like their products. Their Archer routers offer a good performance/price ratio. I’ve installed multiple in my home and have recommended them to others. I’ve since moved on to Unifi products in my home, but I still have an Archer C2300 laying around… that thing has ridiculous range for an inexpensive consumer router.
 
Uh oh.

I just bought a TP Link router a year ago.

Guess I should check to see if it is set to auto-update firmware.

Am I understanding correctly that if my firmware is not up to date, a bot could hijack my router for use in cyberattacks against peoples or companies’ networks?

Obv. I’m not an IT guy. Can someone explain this to me like I’m 5?
Yep. Check immediately.
 
Back
Top Bottom