CVE-2024-50699
📋 TL;DR
TP-Link TL-WR845N routers with specific firmware versions have weak default administrator credentials that are easily guessable. This allows attackers to gain administrative access to the router's web interface. All users with affected firmware versions who haven't changed default credentials are vulnerable.
💻 Affected Systems
- TP-Link TL-WR845N(UN)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete router compromise allowing network traffic interception, DNS hijacking, malware injection, and use as attack platform
Likely Case
Unauthorized administrative access to router configuration, network monitoring, and credential theft
If Mitigated
Limited impact if strong unique credentials are already configured
🎯 Exploit Status
Exploitation requires authentication attempt with default credentials; documented in security research papers
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not found in provided references
Restart Required: No
Instructions:
No official patch available. Manually change administrator password through web interface
🔧 Temporary Workarounds
Change Default Administrator Password
allLog into router web interface and change the default administrator password to a strong unique password
Manual configuration through web interface: 1. Access router at 192.168.0.1 or 192.168.1.1 2. Login with current credentials 3. Navigate to System Tools > Administration 4. Change administrator password
🧯 If You Can't Patch
- Isolate affected routers from critical network segments
- Implement network segmentation and firewall rules to restrict router management interface access
🔍 How to Verify
Check if Vulnerable:
Attempt to log into router web interface using default credentials (check router documentation for defaults)
Check Version:
Log into router web interface and check Firmware Version under Status or System Tools
Verify Fix Applied:
Verify you cannot log in with old/default credentials and can only access with new strong password
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts followed by successful login
- Administrative login from unexpected IP addresses
Network Indicators:
- HTTP/HTTPS traffic to router management interface from external IPs
- Unusual configuration changes
SIEM Query:
source="router_logs" AND (event="login_success" OR event="admin_access") AND user="admin"