CVE-2024-46340

9.8 CRITICAL

📋 TL;DR

This vulnerability in TP-Link TL-WR845N routers transmits user credentials in plaintext after a factory reset, allowing attackers to intercept login credentials. It affects specific firmware versions of the TL-WR845N(UN)_V4 router models. Attackers on the same network can capture credentials and gain administrative access.

💻 Affected Systems

Products:
  • TP-Link TL-WR845N(UN)_V4
Versions: Firmware versions: 201214, 200909, 190219
Operating Systems: Embedded router OS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers specifically after factory reset operation on affected firmware versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative router access, change DNS settings, intercept all network traffic, install malware on connected devices, and pivot to internal networks.

🟠

Likely Case

Local network attackers capture admin credentials, reconfigure router settings, and monitor network traffic.

🟢

If Mitigated

With network segmentation and monitoring, impact limited to isolated network segment with detection of unusual router configuration changes.

🌐 Internet-Facing: LOW (requires local network access for credential interception)
🏢 Internal Only: HIGH (attackers on local network can exploit without authentication)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network sniffing capabilities on the same network segment as the router after factory reset.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None provided in references

Restart Required: No

Instructions:

Check TP-Link website for firmware updates. If update available: 1. Download firmware from TP-Link support site. 2. Log into router admin interface. 3. Navigate to System Tools > Firmware Upgrade. 4. Upload and apply new firmware. 5. Do NOT perform factory reset after update.

🔧 Temporary Workarounds

Avoid Factory Reset

all

Do not perform factory reset on vulnerable routers. If reset is necessary, immediately change all credentials and monitor network traffic.

Network Segmentation

all

Isolate router management interface to separate VLAN with restricted access.

🧯 If You Can't Patch

  • Replace affected routers with different models or updated versions
  • Implement strict network monitoring for credential transmission and unauthorized configuration changes

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Tools > Firmware Version. If version is 201214, 200909, or 190219, device is vulnerable.

Check Version:

Login to router web interface and navigate to firmware version page, or check via SSH if enabled.

Verify Fix Applied:

After firmware update, verify version changed from vulnerable versions. Use network sniffer to confirm credentials are encrypted after factory reset.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts after factory reset
  • Router configuration changes from unknown IPs
  • Unusual admin login times/locations

Network Indicators:

  • Plaintext HTTP POST requests containing admin credentials after factory reset
  • Unencrypted authentication traffic to router IP

SIEM Query:

source="router_logs" AND (event="factory_reset" OR event="login" AND credential="plaintext")

🔗 References

📤 Share & Export