Hardcoded Password Vulnerability in TP-Link Router
CVE-2024-57040

9.8CRITICAL

Key Information:

Vendor
TP-Link
Vendor
CVE Published:
26 February 2025

Badges

📈 Score: 489👾 Exploit Exists🟡 Public PoC

What is CVE-2024-57040?

CVE-2024-57040 is a significant vulnerability affecting specific models of TP-Link routers, particularly the TL-WR845N series. This vulnerability is centered around a hardcoded password for the root account, which poses a risk of unauthorized access. If exploited, this vulnerability could severely undermine an organization's network security, allowing malicious actors to gain control over the router. Such access can lead to unauthorized data manipulation, eavesdropping on network traffic, or redirecting users to malicious sites, thereby compromising the integrity and confidentiality of sensitive information.

Technical Details

The vulnerability relates to hardcoded credentials that can be exploited through brute force attacks. Specifically, the affected models, TL-WR845N(UN)_V4_200909 and TL-WR845N(UN)_V4_190219, have embedded passwords within their firmware that are not configurable by users. This scenario makes it significantly easier for attackers to gain administrator-level access without prior knowledge of any user-generated passwords. The use of hardcoded access credentials is a critical security concern, as it lowers the barrier for attackers attempting to breach affected systems.

Potential impact of CVE-2024-57040

  1. Unauthorized Access: The most immediate impact of this vulnerability is the potential for unauthorized access to the router's administrative controls. This can allow attackers to modify network settings, introduce malicious configurations, and even disable security features, leading to broader network vulnerabilities.

  2. Data Breaches: With control over the router, an attacker can intercept and manipulate network traffic. This access may lead to significant data breaches, compromising sensitive information transmitted across the network, such as personal identifiable information (PII), financial records, or confidential business data.

  3. Malware Deployment: The vulnerability allows for the potential installation of malware or other malicious software on devices connected to the affected router, turning them into compromised endpoints. This can facilitate further attacks, including ransomware deployment, impacting the overall security posture of an organization.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.