CVE-2023-39745
📋 TL;DR
This buffer overflow vulnerability in TP-Link wireless routers allows attackers to cause Denial of Service (DoS) by sending specially crafted GET requests to the /userRpm/AccessCtrlAccessRulesRpm component. Affected users include anyone using vulnerable TP-Link TL-WR940N V2, TL-WR941ND V5, or TL-WR841N V8 routers with default configurations.
💻 Affected Systems
- TP-Link TL-WR940N V2
- TP-Link TL-WR941ND V5
- TP-Link TL-WR841N V8
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete router crash requiring physical reboot, potentially disrupting all network connectivity for extended periods.
Likely Case
Router becomes unresponsive, requiring manual reboot to restore functionality.
If Mitigated
No impact if router is behind firewall blocking external access to web interface.
🎯 Exploit Status
Simple GET request exploitation with public technical details available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check TP-Link support for latest firmware
Vendor Advisory: https://www.tp-link.com/support/download/
Restart Required: Yes
Instructions:
1. Visit TP-Link support site. 2. Download latest firmware for your model. 3. Log into router web interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install new firmware. 6. Wait for automatic reboot.
🔧 Temporary Workarounds
Disable Remote Management
allPrevent external access to router web interface
Change Default Admin Credentials
allMitigate unauthorized access attempts
🧯 If You Can't Patch
- Place router behind firewall blocking inbound access to ports 80/443
- Disable UPnP and ensure no port forwarding to router management interface
🔍 How to Verify
Check if Vulnerable:
Check router model and firmware version via web interface at 192.168.0.1 or 192.168.1.1
Check Version:
curl -s http://router-ip/userRpm/LoginRpm.htm | grep -i firmware
Verify Fix Applied:
Verify firmware version matches latest from TP-Link support site
📡 Detection & Monitoring
Log Indicators:
- Multiple failed access attempts to /userRpm/AccessCtrlAccessRulesRpm
- Router reboot events without user action
Network Indicators:
- Unusual GET requests to router management interface
- Traffic patterns suggesting DoS attempts
SIEM Query:
source="router.log" AND (uri="/userRpm/AccessCtrlAccessRulesRpm" OR event="reboot")
🔗 References
- https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/16/TP-Link%20WR940N%20WR941ND%20WR841N%20wireless%20router%20userRpmAccessCtrlAccessRulesRpm%20buffer%20read%20out-of-bounds%20vulnerability.md
- https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/16/TP-Link%20WR940N%20WR941ND%20WR841N%20wireless%20router%20userRpmAccessCtrlAccessRulesRpm%20buffer%20read%20out-of-bounds%20vulnerability.md