CVE-2021-4144

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary operating system commands on TP-Link TL-WR802N V4(JP) routers. Attackers can potentially gain full control of the device by exploiting improper input validation in the web interface. Only users of this specific router model with firmware versions before 211202 are affected.

💻 Affected Systems

Products:
  • TP-Link TL-WR802N V4(JP)
Versions: All firmware versions prior to 211202
Operating Systems: Embedded Linux (TP-Link custom)
Default Config Vulnerable: ⚠️ Yes
Notes: Only the Japanese version (JP) of the V4 hardware model is affected. Other hardware versions or regions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing attackers to intercept all network traffic, install persistent malware, pivot to internal network devices, and use the router as part of a botnet.

🟠

Likely Case

Attackers gain administrative access to the router, change DNS settings to redirect traffic, capture credentials, and potentially compromise connected devices.

🟢

If Mitigated

If the router is not internet-facing and network segmentation is in place, impact is limited to the local network segment.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication to the router's web interface. The vulnerability is in the web management interface's input validation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 211202 or later

Vendor Advisory: https://www.tp-link.com/jp/support/download/tl-wr802n/#Firmware

Restart Required: Yes

Instructions:

1. Download firmware version 211202 or later from TP-Link Japan website. 2. Log into router web interface. 3. Navigate to System Tools > Firmware Upgrade. 4. Upload the firmware file. 5. Wait for upgrade to complete and router to reboot.

🔧 Temporary Workarounds

Disable remote management

all

Prevents external attackers from accessing the web interface

Navigate to Security > Remote Management and disable

Change default credentials

all

Reduces risk of unauthorized access to management interface

Navigate to System Tools > Password and set strong password

🧯 If You Can't Patch

  • Isolate the router on a dedicated network segment with strict firewall rules
  • Implement network monitoring for unusual outbound connections from the router

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface under System Tools > Firmware Upgrade. If version is older than 211202, device is vulnerable.

Check Version:

Not applicable - check via web interface only

Verify Fix Applied:

After updating, verify firmware version shows 211202 or newer in System Tools > Firmware Upgrade page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed login attempts followed by successful login
  • Unexpected firmware modification attempts

Network Indicators:

  • Unusual outbound connections from router IP
  • DNS queries to suspicious domains from router
  • Unexpected port scans originating from router

SIEM Query:

source="router_logs" AND (event_type="command_execution" OR event_type="firmware_change")

🔗 References

📤 Share & Export