Authentication Bypass in TP-Link WR840N v6 Router
CVE-2024-57050
What is CVE-2024-57050?
CVE-2024-57050 is a significant vulnerability affecting the TP-Link WR840N v6 router, a device commonly used for home and small office network management. This vulnerability allows unauthorized entities to bypass authentication mechanisms on certain interfaces of the router, enabling them to access functionalities without proper credentials. If exploited, this flaw can lead to various security risks, including unauthorized changes to the router's configuration, which could compromise the network's security and stability.
Technical Details
The vulnerability resides in the authentication process of the TP-Link WR840N v6 router's firmware versions 0.9.1 4.16 and earlier. It specifically allows an attacker to manipulate requests by adding a Referer header, such as http://tplinkwifi.net
, which the router mistakenly interprets as a legitimate authentication confirmation. This flaw essentially compromises the expected secure interactions with the device's management interfaces, potentially allowing unauthorized access to sensitive settings and data.
Potential Impact of CVE-2024-57050
-
Unauthorized Access to Router Management: Attackers could gain entry to the router's management interfaces without proper authentication, allowing them to manipulate configurations, change network settings, or disable security features.
-
Network Compromise: By altering router settings, an attacker could redirect traffic, execute man-in-the-middle attacks, or install malicious firmware, jeopardizing the confidentiality and integrity of all devices connected to the network.
-
Data Breaches: Access to the router's management features could expose sensitive information, potentially resulting in data theft or the interception of sensitive communications occurring over the compromised network.
References
EPSS Score
27% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved