CVE-2022-30075
📋 TL;DR
This vulnerability allows attackers to execute arbitrary code on TP-Link AX50 routers by uploading a malicious backup file through the web interface. It affects users running firmware version 210730 or older. Successful exploitation gives attackers full control of the router.
💻 Affected Systems
- TP-Link Archer AX50
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete router compromise allowing attackers to intercept all network traffic, install persistent malware, pivot to internal networks, and disable security features.
Likely Case
Router takeover leading to DNS hijacking, credential theft from network traffic, and deployment of botnet malware.
If Mitigated
Limited impact if backup import functionality is disabled or network segmentation isolates the router.
🎯 Exploit Status
Exploit requires authentication to access backup import feature. Public exploit code available on GitHub and Exploit-DB.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firmware newer than 210730
Vendor Advisory: http://tp-link.com
Restart Required: Yes
Instructions:
1. Log into router web interface. 2. Navigate to System Tools > Firmware Upgrade. 3. Download latest firmware from TP-Link website. 4. Upload and install firmware. 5. Router will reboot automatically.
🔧 Temporary Workarounds
Disable remote management
allPrevent external access to router web interface
Disable backup functionality
allRemove backup import/export feature if possible
🧯 If You Can't Patch
- Isolate router on separate VLAN with strict firewall rules
- Implement network monitoring for suspicious backup file uploads
🔍 How to Verify
Check if Vulnerable:
Check firmware version in router web interface under System Tools > Firmware Upgrade
Check Version:
Not applicable - check via web interface
Verify Fix Applied:
Confirm firmware version is newer than 210730
📡 Detection & Monitoring
Log Indicators:
- Backup file upload events
- Unusual configuration changes
- New admin user creation
Network Indicators:
- Unexpected outbound connections from router
- DNS changes
- Port scanning from router
SIEM Query:
source="router_logs" AND (event="backup_upload" OR event="config_change")
🔗 References
- http://packetstormsecurity.com/files/167522/TP-Link-AX50-Remote-Code-Execution.html
- http://tp-link.com
- https://github.com/aaronsvk
- https://github.com/aaronsvk/CVE-2022-30075
- https://www.exploit-db.com/exploits/50962
- http://packetstormsecurity.com/files/167522/TP-Link-AX50-Remote-Code-Execution.html
- http://tp-link.com
- https://github.com/aaronsvk
- https://github.com/aaronsvk/CVE-2022-30075
- https://www.exploit-db.com/exploits/50962