Critical Security Vulnerability Discovered in TP-Link Router: What You Need to Know
Security researchers have identified a critical vulnerability in the TP-Link TL-WR845N router that could allow attackers to gain full control of the device. The flaw, rated as “Critical” with a severity score of 9.8, exposes users to significant security risks including network infiltration and use in broader cyberattacks.
This alarming discovery was made by an IoT security research team from the Indian Institute of Technology Allahabad, who found that attackers could obtain root shell authentication credentials, effectively giving them complete control over the affected routers.
The vulnerability, identified as CVE-2024-57040, stems from hardcoded authentication credentials within the firmware. Researchers discovered plaintext root usernames and hashed passwords stored in specific firmware files (squashfs-root/etc/passwd and squashfs-root/etc/passwd.bak).
What makes this particularly concerning is the simplicity of the credentials – analysis revealed the username and password were set to the easily guessable combination of “admin/1234.”
The security flaw impacts the following firmware versions of the TP-Link TL-WR845N router:
By exploiting this vulnerability, malicious actors could:
At the time of publication, TP-Link has not yet released an official response or patched firmware to address this vulnerability. Until an update becomes available, users of affected devices should implement these protective measures:
This incident highlights the ongoing security challenges facing routers and IoT devices. Users of the affected TP-Link models should remain vigilant and apply firmware updates as soon as they become available from the manufacturer.
TP-Link is a global provider of networking products and smart home technology, serving hundreds of millions of users in over 170 countries. Founded in 1996, the company has established itself as a reliable manufacturer of consumer and business networking solutions including routers, switches, access points, and smart home devices. This security incident underscores the importance of maintaining strong security practices even with established hardware providers.