CVE-2024-37662

6.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers on the same wireless network to disrupt or hijack TCP connections by sending forged TCP RST packets to the router. The router improperly handles these packets, causing it to remove NAT mappings and disconnect victims from remote servers. Anyone using the affected TP-LINK router with vulnerable firmware is at risk.

💻 Affected Systems

Products:
  • TP-LINK TL-7DR5130
Versions: v1.0.23
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with the specific vulnerable firmware version. Requires attacker to be on the same wireless network.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could persistently disconnect victims from critical services (banking, email, VPN) or hijack sessions to steal credentials and sensitive data.

🟠

Likely Case

Intermittent connection drops and service disruptions for users on the affected network, potentially causing productivity loss.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to temporary connection issues for affected devices.

🌐 Internet-Facing: MEDIUM - Attackers must be on the same WLAN, but once there, they can affect connections to any internet service.
🏢 Internal Only: HIGH - The attack requires local network access, making all devices on the vulnerable router's network potential targets.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The attack requires only basic network tools to craft and send TCP RST packets. No authentication or special privileges needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check TP-LINK website for firmware updates. 2. Download latest firmware for TL-7DR5130. 3. Access router admin interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Enable MAC filtering

all

Restrict WLAN access to known devices only to prevent unauthorized attackers from joining the network.

Use WPA3 encryption

all

Upgrade wireless security to WPA3 if supported to make network access more difficult for attackers.

🧯 If You Can't Patch

  • Segment critical devices onto separate VLANs or physical networks
  • Monitor for unusual TCP RST traffic patterns and implement network intrusion detection

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is exactly v1.0.23, the device is vulnerable.

Check Version:

Login to router admin interface and navigate to System Tools > Firmware Upgrade to view current version.

Verify Fix Applied:

After updating firmware, verify the version has changed from v1.0.23 to a newer version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual TCP connection resets
  • Multiple TCP RST packets from internal sources
  • NAT table flushes

Network Indicators:

  • Spoofed TCP RST packets with valid sequence numbers
  • Unusual TCP traffic patterns from single internal source

SIEM Query:

source.ip IN internal_network AND tcp.flags.reset = 1 AND count() > threshold GROUP BY dest.ip

🔗 References

📤 Share & Export