Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-22733: n/a

0
Low
VulnerabilityCVE-2024-22733cvecve-2024-22733
Published: Fri Nov 01 2024 (11/01/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

TP Link MR200 V4 Firmware version 210201 was discovered to contain a null-pointer-dereference in the web administration panel on /cgi/login via the sign, Action or LoginStatus query parameters which could lead to a denial of service by a local or remote unauthenticated attacker.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:14:22 UTC

Technical Analysis

The vulnerability identified as CVE-2024-22733 affects the TP Link MR200 V4 router running firmware version 210201. It involves a null-pointer dereference in the web administration panel, specifically at the /cgi/login endpoint. The flaw can be triggered by sending specially crafted HTTP requests with manipulated query parameters: sign, Action, or LoginStatus. When these parameters are processed, the router's firmware attempts to dereference a null pointer, causing the web administration service to crash or become unresponsive, resulting in a denial of service condition. The vulnerability can be exploited by an attacker with local or adjacent network access without requiring authentication or user interaction. The impact is limited to availability disruption; there is no indication that confidentiality or integrity of data is affected. The CVSS 3.1 vector (AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) reflects that the attack requires local or adjacent network access (AV:A), low complexity (AC:L), requires privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impacts availability only (A:L). No public exploits or patches are currently available, and the vulnerability is classified under CWE-476 (NULL Pointer Dereference).

Potential Impact

The primary impact of CVE-2024-22733 is denial of service, which can disrupt network management and connectivity for organizations relying on the TP Link MR200 V4 router with the affected firmware. This could lead to temporary loss of administrative access to the router, potentially affecting network availability and operational continuity. While the impact is limited to availability and does not compromise data confidentiality or integrity, disruption of router management can hinder timely response to other network events or attacks. Organizations with critical infrastructure or services dependent on this router model may experience operational delays or outages. Since exploitation requires local or adjacent network access and privileges, the risk is somewhat mitigated by network segmentation and access controls. However, in environments where attackers can gain such access, the vulnerability could be leveraged to cause service interruptions.

Mitigation Recommendations

To mitigate CVE-2024-22733, organizations should first verify if they are using the TP Link MR200 V4 router with firmware version 210201. If so, they should limit access to the router's web administration panel to trusted networks and authorized personnel only, employing network segmentation and strict access controls. Monitoring network traffic for unusual or malformed requests targeting /cgi/login can help detect exploitation attempts. Since no official patch is currently available, consider disabling remote management features or restricting management interfaces to internal networks. Regularly check TP Link's official channels for firmware updates addressing this vulnerability and apply patches promptly once released. Additionally, implement network intrusion detection systems (NIDS) with signatures targeting anomalous HTTP requests to the affected endpoint. For environments with multiple routers, consider upgrading to models or firmware versions without this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d4db7ef31ef0b570215

Added to database: 2/25/2026, 9:44:45 PM

Last enriched: 2/28/2026, 9:14:22 AM

Last updated: 4/11/2026, 11:09:45 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses