TP-LINK TL-7DR5130 v1.0.23 is vulnerable to forged ICMP redirect message attacks. An attacker in the same WLAN as the victim can hijack the traffic between the victim and any remote server by sending out forged ICMP redirect messages.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/tl-7dr5130-redirect.md | Exploit Third Party Advisory |
https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/tl-7dr5130-redirect.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
06 Jun 2025, 17:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/tl-7dr5130-redirect.md - Exploit, Third Party Advisory | |
CPE | cpe:2.3:h:tp-link:tl-7dr5130:-:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-7dr5130_firmware:1.0.23:*:*:*:*:*:*:* |
|
CWE | CWE-346 | |
First Time |
Tp-link tl-7dr5130 Firmware
Tp-link tl-7dr5130 Tp-link |
17 Jun 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-17 18:15
Updated : 2025-06-06 17:09
NVD link : CVE-2024-37661
Mitre link : CVE-2024-37661
JSON object : View
Products Affected
tp-link
- tl-7dr5130_firmware
- tl-7dr5130
CWE
CWE-346
Origin Validation Error