TP-LINK TL-7DR5130 v1.0.23 is vulnerable to forged ICMP redirect message attacks. An attacker in the same WLAN as the victim can hijack the traffic between the victim and any remote server by sending out forged ICMP redirect messages.
References
Link | Resource |
---|---|
https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/tl-7dr5130-redirect.md | Exploit Third Party Advisory |
https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/tl-7dr5130-redirect.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
06 Jun 2025, 17:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:tp-link:tl-7dr5130_firmware:1.0.23:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tl-7dr5130:-:*:*:*:*:*:*:* |
|
First Time |
Tp-link tl-7dr5130
Tp-link tl-7dr5130 Firmware Tp-link |
|
CWE | CWE-346 | |
References | () https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/tl-7dr5130-redirect.md - Exploit, Third Party Advisory |
Information
Published : 2024-06-17 18:15
Updated : 2025-06-06 17:09
NVD link : CVE-2024-37661
Mitre link : CVE-2024-37661
CVE.ORG link : CVE-2024-37661
JSON object : View
Products Affected
tp-link
- tl-7dr5130
- tl-7dr5130_firmware
CWE
CWE-346
Origin Validation Error