First published: Wed Mar 25 2020(Updated: )
This vulnerability allows a firewall bypass on affected installations of TP-Link Archer A7 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of IPv6 connections. The issue results from the lack of proper filtering of IPv6 SSH connections. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.
This vulnerability allows a firewall bypass on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of IPv6 connections. The issue results from the lack of proper filtering of IPv6 SSH connections. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-9663.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Archer A7 | ||
Tp-link Ac1750 Firmware | =190726 | |
TP-Link AC1750 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10887 is a vulnerability that allows a firewall bypass on TP-Link Archer A7 routers.
CVE-2020-10887 has a severity rating of critical (9.8).
CVE-2020-10887 allows attackers to bypass the firewall on affected routers.
No, authentication is not required to exploit CVE-2020-10887.
To fix CVE-2020-10887, update your TP-Link Archer A7 firmware to the latest version.