CVE-2022-26987

7.8 HIGH

📋 TL;DR

This CVE describes a stack overflow vulnerability in the MmtAtePrase function of several TP-Link, Mercury, and Fast router models. Local users can exploit this to achieve remote code execution on affected devices. The vulnerability affects specific firmware versions of these consumer-grade routers.

💻 Affected Systems

Products:
  • TP-Link TL-WDR7660
  • Mercury D196G
  • Fast FAC1900R
Versions: TP-Link TL-WDR7660 2.0.30, Mercury D196G 20200109_2.0.4, Fast FAC1900R 20190827_2.0.2
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific firmware versions only. Other models or versions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local network access gains full control of the router, enabling traffic interception, credential theft, network pivoting, and persistent backdoor installation.

🟠

Likely Case

Local network attacker executes arbitrary code with router privileges, potentially modifying configurations, intercepting traffic, or disabling security features.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the router itself without lateral movement to other systems.

🌐 Internet-Facing: MEDIUM - Routers are internet-facing by design, but exploitation requires local network access first.
🏢 Internal Only: HIGH - Local network access is sufficient for exploitation, making internal threats significant.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local network access. Proof-of-concept details are available in public repositories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor for latest firmware updates

Vendor Advisory: http://tp-link.com

Restart Required: Yes

Instructions:

1. Visit vendor support website. 2. Download latest firmware for your model. 3. Access router admin interface. 4. Upload and apply firmware update. 5. Reboot router.

🔧 Temporary Workarounds

Network segmentation

all

Isolate router management interface to trusted network segments only

Access control restrictions

all

Limit local network access to router management interface

🧯 If You Can't Patch

  • Replace affected routers with updated models or different vendors
  • Implement strict network monitoring for suspicious router activity

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface against affected versions list

Check Version:

Router-specific: Typically accessed via web interface at 192.168.1.1 or similar

Verify Fix Applied:

Confirm firmware version has been updated to a version not listed in affected versions

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution on router
  • Unexpected firmware modification attempts
  • Abnormal network traffic patterns from router

Network Indicators:

  • Suspicious outbound connections from router
  • Unexpected port openings on router

SIEM Query:

Example: 'source_ip=router_ip AND (event_type=process_execution OR event_type=config_change)'

🔗 References

📤 Share & Export