CVE-2024-22733
📋 TL;DR
This vulnerability allows unauthenticated attackers to cause a denial of service on TP-Link MR200 V4 routers by sending specially crafted requests to the web administration panel. The null pointer dereference crashes the web service, requiring a device reboot to restore functionality. All users with affected firmware versions are vulnerable.
💻 Affected Systems
- TP-Link MR200 V4
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete denial of service requiring physical device reboot, potentially disrupting network connectivity for all connected devices.
Likely Case
Web administration panel becomes unavailable, requiring manual device reboot to restore management access.
If Mitigated
If web admin panel is disabled or firewalled, impact is limited to potential service disruption if other attack vectors exist.
🎯 Exploit Status
Exploit requires simple HTTP requests to /cgi/login endpoint with malicious query parameters. No authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: Yes
Instructions:
1. Check TP-Link support site for firmware updates
2. Download latest firmware for MR200 V4
3. Access router web interface
4. Navigate to System Tools > Firmware Upgrade
5. Upload and apply new firmware
6. Reboot router after update completes
🔧 Temporary Workarounds
Disable Remote Web Management
allPrevent external access to web administration panel
Restrict Web Admin Access
allConfigure firewall rules to limit access to web admin panel
🧯 If You Can't Patch
- Disable web administration panel entirely if not needed
- Implement network segmentation to isolate router from untrusted networks
🔍 How to Verify
Check if Vulnerable:
Check firmware version in web admin panel under System Tools > Firmware Upgrade. If version is 210201, device is vulnerable.
Check Version:
Not applicable - check via web interface or router management app
Verify Fix Applied:
After firmware update, verify version has changed from 210201. Test web admin panel functionality remains stable.
📡 Detection & Monitoring
Log Indicators:
- Web service crashes
- Repeated login attempts with malformed parameters
- Router reboot events
Network Indicators:
- HTTP requests to /cgi/login with sign, Action, or LoginStatus parameters
- Sudden loss of web admin connectivity
SIEM Query:
source="router_logs" AND (uri="/cgi/login" AND (param="sign" OR param="Action" OR param="LoginStatus"))