TP-Hyperlink fixes important RCE bug in well-liked C5400X gaming router

The TP-Hyperlink Archer C5400X gaming router is weak to safety flaws that would allow an unauthenticated, distant attacker to execute instructions on the system.

The TP-Hyperlink Archer C5400X is a high-end tri-band gaming router designed to supply sturdy efficiency and superior options for gaming and different demanding purposes, and primarily based on the variety of person evaluations the product has on on-line shops, it seems to be a preferred alternative amongst players.

Arbitrary command execution on routers can result in hijacking routers, knowledge interception, altering DNS settings, and probably breaching inside networks.

Vulnerability particulars

The flaw on the TP-Hyperlink Archer C5400X is tracked as CVE-2024-5035 (CVSS v4 rating: 10.0, “critical”) and was recognized by analysts at OneKey via binary static evaluation.

The researchers discovered that the ‘rftest’ binary exposes a community service weak to command injection and buffer overflows on TCP ports 8888, 8889, and 8890.

The ‘rftest’ service runs a community listener on these ports to carry out wi-fi interface self-assessment and associated duties.

An attacker utilizing shell metacharacters can ship specifically crafted messages to those ports, probably attaining arbitrary command execution with elevated privileges.

Shell metacharacters are particular characters like semicolons, ampersands, and pipes that are used for higher operate management on command-line shells. Nonetheless, they may also be abused for command execution when the person enter isn’t correctly sanitized to stop unauthorized actions.

Command ID injection through port 8888
Command ID injection via port 8888
Supply: OneKey

Repair obtainable

Because the talked about ports are open and actively utilized by the ‘rftest’ service on the router’s default configuration, they affect all customers of the system utilizing the weak firmware variations, via 1.1.1.6.

OneKey analysts reported their findings to TP-Hyperlink’s PSIRT on February 16, 2024, whereas the seller had a beta patch prepared by April 10, 2024.

Lastly, the safety replace got here late final week, on Might 24, 2024, with the discharge of Archer C5400X(EU)_V1_1.1.7 Construct 20240510, which successfully addresses CVE-2024-5035.

The applied repair was to discard any instructions containing shell metacharacters, so these are filtered out in all incoming messages.

Customers are advisable to obtain the firmware replace from TP-Hyperlink’s official obtain portal or use their router admin panel to carry out the replace.

Recent articles

The right way to Construct Customized Controls in Sysdig Safe 

Within the context of cloud safety posture administration (CSPM),...

Malicious adverts exploited Web Explorer zero day to drop malware

The North Korean hacking group ScarCruft launched a large-scale...

From Misuse to Abuse: AI Dangers and Assaults

Oct 16, 2024The Hacker InformationSynthetic Intelligence / Cybercrime AI from...