Hardcoded Password Vulnerability in TP-Link Router
CVE-2024-57040
Key Information:
- Vendor
- TP-Link
- Status
- Vendor
- CVE Published:
- 26 February 2025
Badges
What is CVE-2024-57040?
CVE-2024-57040 is a significant vulnerability affecting specific models of TP-Link routers, particularly the TL-WR845N series. This vulnerability is centered around a hardcoded password for the root account, which poses a risk of unauthorized access. If exploited, this vulnerability could severely undermine an organization's network security, allowing malicious actors to gain control over the router. Such access can lead to unauthorized data manipulation, eavesdropping on network traffic, or redirecting users to malicious sites, thereby compromising the integrity and confidentiality of sensitive information.
Technical Details
The vulnerability relates to hardcoded credentials that can be exploited through brute force attacks. Specifically, the affected models, TL-WR845N(UN)_V4_200909 and TL-WR845N(UN)_V4_190219, have embedded passwords within their firmware that are not configurable by users. This scenario makes it significantly easier for attackers to gain administrator-level access without prior knowledge of any user-generated passwords. The use of hardcoded access credentials is a critical security concern, as it lowers the barrier for attackers attempting to breach affected systems.
Potential impact of CVE-2024-57040
-
Unauthorized Access: The most immediate impact of this vulnerability is the potential for unauthorized access to the router's administrative controls. This can allow attackers to modify network settings, introduce malicious configurations, and even disable security features, leading to broader network vulnerabilities.
-
Data Breaches: With control over the router, an attacker can intercept and manipulate network traffic. This access may lead to significant data breaches, compromising sensitive information transmitted across the network, such as personal identifiable information (PII), financial records, or confidential business data.
-
Malware Deployment: The vulnerability allows for the potential installation of malware or other malicious software on devices connected to the affected router, turning them into compromised endpoints. This can facilitate further attacks, including ransomware deployment, impacting the overall security posture of an organization.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved