First published: Mon Mar 29 2021(Updated: )
This vulnerability allows a firewall bypass on affected installations of TP-Link Archer A7 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of IPv6 connections. The issue results from the lack of proper filtering of IPv6 SSH connections. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Archer A7 Firmware | <c7\(us\)_v5_210125 | |
TP-Link Archer A7 | ||
Tp-link Archer A7 Firmware | <a7\(us\)_v5_200220 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this TP-Link Archer A7 vulnerability is CVE-2021-27245.
The title of this vulnerability is TP-Link Archer A7 Protection Mechanism Failure Firewall Bypass Vulnerability.
The severity of CVE-2021-27245 is critical with a CVSS score of 8.1.
This vulnerability affects TP-Link Archer A7 routers prior to Archer C7(US)_V5_210125 and Archer A7(US)_V5_200220 AC1750.
No, authentication is not required to exploit CVE-2021-27245.
The specific flaw within the handling of IPv6 connections is a firewall bypass.
To fix this vulnerability, update your TP-Link Archer A7 router to Archer C7(US)_V5_210125 or Archer A7(US)_V5_200220 AC1750 firmware.