Gandalf_The_Grey
Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Forum Veteran
- Content source
- https://kb.cert.org/vuls/id/554637
The TP-Link Archer C50 router, which has reached End-of-Life (EOL), contains a hardcoded encryption key in its firmware, enabling decryption of sensitive configuration files. This vulnerability allows attackers to trivially access administrative credentials, Wi-Fi passwords, and other internal settings, after authentication to the device.
The CERT/CC is currently unaware of a practical solution to this problem. Note: The TP-Link Archer C50 has reached End-of-Life (EOL) and no longer receives firmware updates or security support from the vendor.
Users are strongly advised to:
- Retire and replace the Archer C50 with a supported router model
- Avoid using devices with known cryptographic flaws
- Secure or delete any exported configuration files
- Change passwords if configuration files were exposed or restored from backup
CERT/CC Vulnerability Note VU#554637
TP-Link Archer C50 router is vulnerable to configuration-file decryption