Home > Cyber News > Amazon Best-Selling TP-Link Router Shipped with Vulnerable Firmware

Amazon Best-Selling TP-Link Router Shipped with Vulnerable Firmware

tp-link firmware vulnerabilities
A number of security flaws in the default firmware and web interface app of a popular router were discovered by CyberNews researchers that could expose its owners at risk of man-in-the-middle and denial-of-service attacks.

TP-Link AC1200 Archer C50 (v6) is a best-selling ‘Amazon’s Choice’ wifi router retails for £34.50 (~$48) in the UK, mainly sold within the European market. Unfortunately, the device is shipped with an outdated firmware version susceptible to numerous security flaws. Not only is the router sold with vulnerable firmware but it also comes with another critical issue that concerns its web interface app. The app “suffers from subpar security practices and weak encryption,” potentially exposing thousands of owners at risk of attacks.

Owners of the TP-Link AC1200 Archer C50 (v6) router should install the latest firmware update immediately.

What flaws does TP-Link AC1200 Archer C50 (v6) router cointain?

The analysis performed by CyberNews revealed that router contained multiple unpatched flaws in both the default router firmware and its web interface app.

Here is an overview of the discovered issues:

  • The router is shipped with outdated firmware that is vulnerable to dozens of known security flaws.
  • WPS is enabled by default, potentially allowing threat actors to brute-force the router.
    Session tokens are not deleted server-side after logging out of the router app and are accepted for subsequent authorization procedures.
  • The router’s administrator credentials and configuration backup files are encrypted using weak protocols and can be easily decrypted by attackers.
  • The default version of the router’s web interface app suffers from multiple bad security practices and vulnerabilities, including clickjacking, charset mismatch, cookie slack, private IP disclosures, weak HTTPS encryption, and more.

What did TP-Link say in terms of the router flaws?

On July 18, the CyberNews team reached out to the router company to see whether they were aware of the flaws. The company stated that they will force firmware updates on the vulnerable devices. The owners of these devices are to receive relevant notifications about the updates via the management interface on the web terminal or the mobile app Tether.

Previous vulnerabilities in TP-Link devices include a flaw in TP-Link Wi-Fi Extenders, a zero-day in TP-Link SR20 Smart Home routers, and a critical issue in TP-LINK TL-WR841N routers.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree