This vulnerability allows a firewall bypass on affected installations of TP-Link Archer A7 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of IPv6 connections. The issue results from the lack of proper filtering of IPv6 SSH connections. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Archer A7 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-12309 is considered high due to its potential for firewall bypass.
To fix ZDI-CAN-12309, update your TP-Link Archer A7 AC1750 router to the latest firmware provided by TP-Link.
The consequences of ZDI-CAN-12309 include unauthorized access to network traffic and possible data exposure.
No, authentication is not required to exploit ZDI-CAN-12309.
ZDI-CAN-12309 specifically affects TP-Link Archer A7 AC1750 routers.