TP-Hyperlink fixes important RCE bug in common C5400X gaming router

[ad_1]

TP-link Archer router

The TP-Hyperlink Archer C5400X gaming router is weak to safety flaws that would allow an unauthenticated, distant attacker to execute instructions on the system.

The TP-Hyperlink Archer C5400X is a high-end tri-band gaming router designed to offer sturdy efficiency and superior options for gaming and different demanding functions, and primarily based on the variety of person opinions the product has on on-line shops, it seems to be a well-liked selection amongst players.

Arbitrary command execution on routers can result in hijacking routers, information interception, altering DNS settings, and doubtlessly breaching inner networks.

Vulnerability particulars

The flaw on the TP-Hyperlink Archer C5400X is tracked as CVE-2024-5035 (CVSS v4 rating: 10.0, “important”) and was recognized by analysts at OneKey by binary static evaluation.

The researchers discovered that the ‘rftest’ binary exposes a community service weak to command injection and buffer overflows on TCP ports 8888, 8889, and 8890.

The ‘rftest’ service runs a community listener on these ports to carry out wi-fi interface self-assessment and associated duties.

An attacker utilizing shell metacharacters can ship specifically crafted messages to those ports, doubtlessly reaching arbitrary command execution with elevated privileges.

Shell metacharacters are particular characters like semicolons, ampersands, and pipes that are used for higher operate management on command-line shells. Nonetheless, they can be abused for command execution when the person enter isn’t correctly sanitized to stop unauthorized actions.

Command ID injection through port 8888
Command ID injection by port 8888
Supply: OneKey

Repair out there

Because the talked about ports are open and actively utilized by the ‘rftest’ service on the router’s default configuration, they impression all customers of the system utilizing the weak firmware variations, by 1.1.1.6.

OneKey analysts reported their findings to TP-Hyperlink’s PSIRT on February 16, 2024, whereas the seller had a beta patch prepared by April 10, 2024.

Lastly, the safety replace got here late final week, on Could 24, 2024, with the discharge of Archer C5400X(EU)_V1_1.1.7 Construct 20240510, which successfully addresses CVE-2024-5035.

The carried out repair was to discard any instructions containing shell metacharacters, so these are filtered out in all incoming messages.

Customers are advisable to obtain the firmware replace from TP-Hyperlink’s official obtain portal or use their router admin panel to carry out the replace.

[ad_2]


Posted

in

by

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

LLC CRAWLERS 2024