CVE-2024-22733: n/a
TP Link MR200 V4 Firmware version 210201 was discovered to contain a null-pointer-dereference in the web administration panel on /cgi/login via the sign, Action or LoginStatus query parameters which could lead to a denial of service by a local or remote unauthenticated attacker.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2024-22733 affects the TP Link MR200 V4 router running firmware version 210201. It involves a null-pointer dereference in the web administration panel, specifically at the /cgi/login endpoint. The flaw can be triggered by sending specially crafted HTTP requests with manipulated query parameters: sign, Action, or LoginStatus. When these parameters are processed, the router's firmware attempts to dereference a null pointer, causing the web administration service to crash or become unresponsive, resulting in a denial of service condition. The vulnerability can be exploited by an attacker with local or adjacent network access without requiring authentication or user interaction. The impact is limited to availability disruption; there is no indication that confidentiality or integrity of data is affected. The CVSS 3.1 vector (AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) reflects that the attack requires local or adjacent network access (AV:A), low complexity (AC:L), requires privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impacts availability only (A:L). No public exploits or patches are currently available, and the vulnerability is classified under CWE-476 (NULL Pointer Dereference).
Potential Impact
The primary impact of CVE-2024-22733 is denial of service, which can disrupt network management and connectivity for organizations relying on the TP Link MR200 V4 router with the affected firmware. This could lead to temporary loss of administrative access to the router, potentially affecting network availability and operational continuity. While the impact is limited to availability and does not compromise data confidentiality or integrity, disruption of router management can hinder timely response to other network events or attacks. Organizations with critical infrastructure or services dependent on this router model may experience operational delays or outages. Since exploitation requires local or adjacent network access and privileges, the risk is somewhat mitigated by network segmentation and access controls. However, in environments where attackers can gain such access, the vulnerability could be leveraged to cause service interruptions.
Mitigation Recommendations
To mitigate CVE-2024-22733, organizations should first verify if they are using the TP Link MR200 V4 router with firmware version 210201. If so, they should limit access to the router's web administration panel to trusted networks and authorized personnel only, employing network segmentation and strict access controls. Monitoring network traffic for unusual or malformed requests targeting /cgi/login can help detect exploitation attempts. Since no official patch is currently available, consider disabling remote management features or restricting management interfaces to internal networks. Regularly check TP Link's official channels for firmware updates addressing this vulnerability and apply patches promptly once released. Additionally, implement network intrusion detection systems (NIDS) with signatures targeting anomalous HTTP requests to the affected endpoint. For environments with multiple routers, consider upgrading to models or firmware versions without this vulnerability.
Affected Countries
United States, China, India, Germany, United Kingdom, Brazil, Russia, France, Australia, Canada
CVE-2024-22733: n/a
Description
TP Link MR200 V4 Firmware version 210201 was discovered to contain a null-pointer-dereference in the web administration panel on /cgi/login via the sign, Action or LoginStatus query parameters which could lead to a denial of service by a local or remote unauthenticated attacker.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2024-22733 affects the TP Link MR200 V4 router running firmware version 210201. It involves a null-pointer dereference in the web administration panel, specifically at the /cgi/login endpoint. The flaw can be triggered by sending specially crafted HTTP requests with manipulated query parameters: sign, Action, or LoginStatus. When these parameters are processed, the router's firmware attempts to dereference a null pointer, causing the web administration service to crash or become unresponsive, resulting in a denial of service condition. The vulnerability can be exploited by an attacker with local or adjacent network access without requiring authentication or user interaction. The impact is limited to availability disruption; there is no indication that confidentiality or integrity of data is affected. The CVSS 3.1 vector (AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) reflects that the attack requires local or adjacent network access (AV:A), low complexity (AC:L), requires privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impacts availability only (A:L). No public exploits or patches are currently available, and the vulnerability is classified under CWE-476 (NULL Pointer Dereference).
Potential Impact
The primary impact of CVE-2024-22733 is denial of service, which can disrupt network management and connectivity for organizations relying on the TP Link MR200 V4 router with the affected firmware. This could lead to temporary loss of administrative access to the router, potentially affecting network availability and operational continuity. While the impact is limited to availability and does not compromise data confidentiality or integrity, disruption of router management can hinder timely response to other network events or attacks. Organizations with critical infrastructure or services dependent on this router model may experience operational delays or outages. Since exploitation requires local or adjacent network access and privileges, the risk is somewhat mitigated by network segmentation and access controls. However, in environments where attackers can gain such access, the vulnerability could be leveraged to cause service interruptions.
Mitigation Recommendations
To mitigate CVE-2024-22733, organizations should first verify if they are using the TP Link MR200 V4 router with firmware version 210201. If so, they should limit access to the router's web administration panel to trusted networks and authorized personnel only, employing network segmentation and strict access controls. Monitoring network traffic for unusual or malformed requests targeting /cgi/login can help detect exploitation attempts. Since no official patch is currently available, consider disabling remote management features or restricting management interfaces to internal networks. Regularly check TP Link's official channels for firmware updates addressing this vulnerability and apply patches promptly once released. Additionally, implement network intrusion detection systems (NIDS) with signatures targeting anomalous HTTP requests to the affected endpoint. For environments with multiple routers, consider upgrading to models or firmware versions without this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-01-11T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d4db7ef31ef0b570215
Added to database: 2/25/2026, 9:44:45 PM
Last enriched: 2/28/2026, 9:14:22 AM
Last updated: 4/11/2026, 11:09:45 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.