This vulnerability allows a firewall bypass on affected installations of TP-Link Archer A7 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of IPv6 connections. The issue results from the lack of proper filtering of IPv6 SSH connections. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Archer A7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-21-214 is classified as a high severity vulnerability due to its potential for firewall bypass.
To fix ZDI-21-214, ensure that you update the TP-Link Archer A7 router firmware to the latest version provided by the vendor.
Exploiting ZDI-21-214 allows unauthorized access to the network through a firewall bypass, potentially exposing sensitive data.
ZDI-21-214 specifically affects TP-Link Archer A7 AC1750 routers configured with IPv6.
No, authentication is not required to exploit ZDI-21-214, making it more critical for users to address the vulnerability.