CVE-2024-57049 Scanner
CVE-2024-57049 Scanner - Missing Authorization vulnerability in TP-Link Archer C20
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
10 days
Scan only one
Domain, Subdomain, IPv4
Toolbox
-
TP-Link Archer C20 is a popular dual-band wireless router widely used in homes and small offices. It provides Wi-Fi connectivity and network management features to users, allowing them to connect multiple devices securely. The router is known for its affordability and reliability, making it a common choice for budget-conscious consumers. Administrators can manage the router via a web-based control panel, which includes settings for network security and performance optimization. Firmware updates are periodically released to address security vulnerabilities and enhance functionality. Due to its widespread use, vulnerabilities in the TP-Link Archer C20 can pose significant security risks.
The Missing Authorization vulnerability in the TP-Link Archer C20 allows unauthorized access to restricted administrative interfaces. Attackers can bypass authentication by manipulating HTTP request headers, particularly the Referer header. This vulnerability exists in the router's CGI directory, where adding a specific Referer value enables unrestricted access. By exploiting this weakness, attackers can gain control over critical administrative settings without needing valid credentials. The issue stems from inadequate verification of authentication mechanisms, leading to a severe security flaw. If left unpatched, this vulnerability could compromise the router’s integrity and the security of connected networks.
The vulnerability is present in firmware version V6.6_230412 and earlier, where the authentication bypass mechanism is triggered via HTTP requests. Attackers send specially crafted requests with the Referer header set to "http://tplinkwifi.net" to deceive the router into granting access. The affected CGI directory processes these requests without enforcing proper authentication, exposing sensitive administration functionalities. The flaw allows attackers to change settings, modify network configurations, and potentially install malicious firmware. A successful attack does not require prior authentication or user interaction, increasing its severity. This makes the vulnerability a critical security concern for all affected devices.
Exploiting this vulnerability can lead to unauthorized access to the router’s administrative panel, allowing attackers to manipulate network configurations. Malicious actors may disable security settings, alter DNS configurations, or set up backdoors for persistent access. This could result in network-wide attacks, such as redirecting users to malicious websites or intercepting sensitive data. In more severe cases, attackers might lock users out of their own network by changing credentials or disabling internet access. Organizations using the TP-Link Archer C20 in corporate environments risk exposure to larger-scale cyber threats. Prompt mitigation is necessary to prevent potential exploitation and data breaches.
REFERENCES