CVE-2024-22733

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to cause a denial of service on TP-Link MR200 V4 routers by sending specially crafted requests to the web administration panel. The null pointer dereference crashes the web service, requiring a device reboot to restore functionality. All users with affected firmware versions are vulnerable.

💻 Affected Systems

Products:
  • TP-Link MR200 V4
Versions: Firmware version 210201
Operating Systems: Embedded router OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects MR200 V4 hardware revision with specific vulnerable firmware. Other models and versions may be unaffected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service requiring physical device reboot, potentially disrupting network connectivity for all connected devices.

🟠

Likely Case

Web administration panel becomes unavailable, requiring manual device reboot to restore management access.

🟢

If Mitigated

If web admin panel is disabled or firewalled, impact is limited to potential service disruption if other attack vectors exist.

🌐 Internet-Facing: HIGH - The web admin panel is typically accessible from the WAN interface by default, making internet-facing devices highly vulnerable.
🏢 Internal Only: MEDIUM - Even internally, unauthenticated attackers on the local network can trigger the DoS condition.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires simple HTTP requests to /cgi/login endpoint with malicious query parameters. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check TP-Link support site for firmware updates
2. Download latest firmware for MR200 V4
3. Access router web interface
4. Navigate to System Tools > Firmware Upgrade
5. Upload and apply new firmware
6. Reboot router after update completes

🔧 Temporary Workarounds

Disable Remote Web Management

all

Prevent external access to web administration panel

Restrict Web Admin Access

all

Configure firewall rules to limit access to web admin panel

🧯 If You Can't Patch

  • Disable web administration panel entirely if not needed
  • Implement network segmentation to isolate router from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check firmware version in web admin panel under System Tools > Firmware Upgrade. If version is 210201, device is vulnerable.

Check Version:

Not applicable - check via web interface or router management app

Verify Fix Applied:

After firmware update, verify version has changed from 210201. Test web admin panel functionality remains stable.

📡 Detection & Monitoring

Log Indicators:

  • Web service crashes
  • Repeated login attempts with malformed parameters
  • Router reboot events

Network Indicators:

  • HTTP requests to /cgi/login with sign, Action, or LoginStatus parameters
  • Sudden loss of web admin connectivity

SIEM Query:

source="router_logs" AND (uri="/cgi/login" AND (param="sign" OR param="Action" OR param="LoginStatus"))

🔗 References

📤 Share & Export