Unpatched Vulnerability Found in TP-Link Routers

TP-Link has confirmed a previously unknown zero-day vulnerability affecting several of its router models. The company said it is investigating the issue and preparing security updates.
Discovery and Technical Details
The flaw was discovered by an independent researcher using the alias ByteRay, who first reported it to TP-Link on May 11, 2024.
Although the vulnerability has not yet been assigned a CVE identifier, ByteRay describes it as a stack buffer overflow in TP-Link’s implementation of the CPE WAN Management Protocol (CWMP). The bug stems from insufficient bounds checking in strncpy
calls that process SOAP SetParameterValues
messages. If the stack buffer size exceeds 3,072 bytes, a buffer overflow can occur, potentially allowing remote code execution.
The researcher noted that attackers could exploit the issue by redirecting vulnerable devices to a malicious CWMP server and delivering an oversized SOAP payload to trigger the overflow.
Potential Impact
If exploited, the flaw could give attackers significant control over affected routers. Possible consequences include:
- Redirecting DNS requests to malicious servers
- Intercepting or altering unencrypted internet traffic
- Injecting malicious data into web sessions
Affected Devices
During testing, ByteRay confirmed the vulnerability in the TP-Link Archer AX10 and Archer AX1500. He also suggested it may affect the EX141, Archer VR400, TD-W9970, and potentially other TP-Link models that use similar CWMP binaries.
TP-Link’s Response
A TP-Link spokesperson told BleepingComputer that the company is reviewing the researcher’s findings to determine the scope of affected devices and the conditions under which the flaw can be exploited, including whether CWMP is enabled by default.
The company said a patch has already been developed for certain European router models, and work is underway on firmware updates for the U.S. and other regions. No specific release dates have been provided.
“Our technical team is thoroughly reviewing the researcher’s findings to confirm the impact criteria for devices and the conditions for exploitation,” TP-Link stated.