CVE-2023-36357

7.7 HIGH

📋 TL;DR

This vulnerability in TP-Link router web interface components allows attackers to cause denial of service via specially crafted GET requests. Affected users include anyone using vulnerable TP-Link router models with the web management interface accessible. The attack can render the router unresponsive, disrupting network connectivity.

💻 Affected Systems

Products:
  • TP-Link TL-WR940N
  • TP-Link TL-WR841N
  • TP-Link TL-WR941ND
Versions: V2/V4/V6 for TL-WR940N; V8/V10 for TL-WR841N; V5 for TL-WR941ND
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default web interface configuration. All affected models with vulnerable firmware versions are susceptible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Router becomes completely unresponsive, requiring physical power cycle and potentially causing extended network downtime for all connected devices.

🟠

Likely Case

Router web interface crashes or becomes unstable, disrupting administrative access and potentially affecting network stability until reboot.

🟢

If Mitigated

Limited to internal network impact with proper segmentation, or no impact if web interface is not exposed.

🌐 Internet-Facing: HIGH - If router web interface is exposed to internet, attackers can easily trigger DoS from anywhere.
🏢 Internal Only: MEDIUM - Internal attackers or malware on local network could disrupt router functionality.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires simple HTTP GET request to specific endpoint. No authentication needed. Public GitHub repository contains proof-of-concept.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official TP-Link advisory found

Restart Required: No

Instructions:

Check TP-Link support website for firmware updates. If available, download latest firmware for your model and upload via web interface.

🔧 Temporary Workarounds

Disable Web Interface Access

all

Disable remote web management and restrict local access

Access router admin panel → Security → Remote Management → Disable
Firewall rules to block port 80/443 to router IP

Network Segmentation

linux

Isolate router management interface from untrusted networks

iptables -A INPUT -s ! 192.168.1.0/24 -p tcp --dport 80 -j DROP
iptables -A INPUT -s ! 192.168.1.0/24 -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Segment router management interface to trusted VLAN only
  • Implement network monitoring for suspicious requests to /userRpm/LocalManageControlRpm

🔍 How to Verify

Check if Vulnerable:

Check router model and firmware version in web interface. If model/version matches affected list and web interface is accessible, assume vulnerable.

Check Version:

curl -s http://[router-ip]/ | grep -i 'firmware version' or check web interface System Tools → Firmware Upgrade

Verify Fix Applied:

Test with crafted GET request to http://[router-ip]/userRpm/LocalManageControlRpm. If router remains responsive, fix may be working.

📡 Detection & Monitoring

Log Indicators:

  • Multiple requests to /userRpm/LocalManageControlRpm
  • Router reboot events
  • Web interface crash logs

Network Indicators:

  • HTTP GET requests to /userRpm/LocalManageControlRpm endpoint
  • Unusual traffic patterns to router management IP

SIEM Query:

source="router.log" AND (uri="/userRpm/LocalManageControlRpm" OR event="web_interface_crash")

🔗 References

📤 Share & Export