Tp-link fixes code execution vulnerability in end-of-life routers

frogboy

In memoriam 1961-2018
Thread author
Verified
Top Poster
Well-known
Jun 9, 2013
6,720
69,342
7,679
Western Australia
Router manufacturer TP-Link recently fixed a vulnerability in a discontinued line of routers that if exploited could have been used to execute code on the device.

Researchers at

Senrio, a firm that specializes in IoT security, uncovered a logic vulnerability in a configuration service present in TP-Link’s PTWR841N V8 router models.

Read More. TP-Link Fixes Code Execution Vulnerability in End-of-Life Routers
 
And the remaining 10% know what is the firmware, they know that it has to be constantly updated, but ... often they forget it :oops:
Haha, so true. I guess I am one of them.
When I bought my TP Link wr841n router, I checked if there were any updates available at the time, there weren't any. After that I didn't thought of updating it. So I guess the update mechanism should atleast be made so that end user can even know that updates are available for their device.
And thanks to MT now I know about the update.
Edit: typo corrected
 
Haha, so true. I guess I am one of them.
When I bought my TP Link wr841n router, I checked if there were any updates available at the time, there weren't any. After that I didn't thought of updating it. So I guess the update mechanism should atleast be made so that end user can even know that updates are available for their device.
And thanks to MT now I know about the update.
Edit: typo corrected
My Netgear shows the update availability in the web command interface, but I often forget to access the interface :D:rolleyes:
 
My Netgear shows the update availability in the web command interface, but I often forget to access the interface :D:rolleyes:
You are not a thrill seeker, are you? Living on the edge:D
Mine doesn't show about any updates on the web console. That should be a standard feature on all the routers/network devices.