CVE-2022-25061
📋 TL;DR
This CVE describes a command injection vulnerability in TP-LINK TL-WR840N routers that allows attackers to execute arbitrary commands on the device. The vulnerability exists in the oal_setIp6DefaultRoute component and affects users of TP-LINK TL-WR840N(ES) V6.20 firmware version 180709.
💻 Affected Systems
- TP-LINK TL-WR840N(ES)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the router allowing attackers to intercept all network traffic, install persistent backdoors, pivot to internal networks, or brick the device.
Likely Case
Router takeover leading to DNS hijacking, credential theft from network traffic, or use as a botnet node.
If Mitigated
Limited impact if router is behind firewall with restricted management interface access and network segmentation.
🎯 Exploit Status
Command injection vulnerabilities typically have low exploitation complexity once the attack vector is identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: http://tp-link.com
Restart Required: Yes
Instructions:
1. Check TP-LINK website for firmware updates
2. Download latest firmware for TL-WR840N(ES)
3. Access router admin interface
4. Navigate to System Tools > Firmware Upgrade
5. Upload and install new firmware
6. Reboot router
🔧 Temporary Workarounds
Disable IPv6
allDisable IPv6 functionality to remove the vulnerable component
Access router admin interface > Network > IPv6 > Disable
Restrict Management Access
allLimit router management interface to trusted IP addresses only
Access router admin interface > Security > Access Control > Enable IP/MAC Binding
🧯 If You Can't Patch
- Replace vulnerable router with updated model
- Place router behind firewall with strict inbound rules
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in admin interface: System Tools > Firmware Upgrade
Check Version:
Check router web interface or use: curl -s http://router-ip/ | grep 'Firmware Version'
Verify Fix Applied:
Verify firmware version has been updated to newer than V6.20_180709
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution in system logs
- Multiple failed login attempts to router admin
Network Indicators:
- Unexpected outbound connections from router
- DNS queries to suspicious domains
SIEM Query:
source="router.log" AND ("command injection" OR "oal_setIp6DefaultRoute" OR suspicious shell commands)
🔗 References
- http://router.com
- http://tp-link.com
- https://east-trowel-102.notion.site/CVE-2021-XXXX-Injection-of-commands-through-object-oal_setIp6DefaultRoute-EN-ddf9c1db199d49829269147ada6cb312
- http://router.com
- http://tp-link.com
- https://east-trowel-102.notion.site/CVE-2021-XXXX-Injection-of-commands-through-object-oal_setIp6DefaultRoute-EN-ddf9c1db199d49829269147ada6cb312