Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37661: n/a

0
Medium
VulnerabilityCVE-2024-37661cvecve-2024-37661
Published: Mon Jun 17 2024 (06/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-37661 is a medium-severity vulnerability affecting TP-LINK TL-7DR5130 version 1. 0. 23, allowing attackers on the same WLAN to hijack victim traffic via forged ICMP redirect messages. This attack enables an adversary to manipulate network routing, redirecting victim traffic to malicious endpoints, potentially compromising confidentiality and integrity, and causing availability disruptions. Exploitation requires the attacker to be on the same wireless network, with low complexity and limited user interaction. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk in shared or public wireless environments. Organizations using this device should prioritize network segmentation and monitoring for anomalous ICMP traffic. Patch information is not yet available, so mitigation relies on network controls and device configuration. Countries with widespread TP-LINK usage and high WLAN deployment in sensitive sectors are most at risk. Defenders must be aware of the potential for man-in-the-middle attacks leveraging ICMP redirects in local wireless networks and implement targeted controls accordingly.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:17:28 UTC

Technical Analysis

The vulnerability identified as CVE-2024-37661 affects the TP-LINK TL-7DR5130 router running firmware version 1.0.23. It allows an attacker who shares the same wireless local area network (WLAN) as the victim to send forged Internet Control Message Protocol (ICMP) redirect messages. ICMP redirect messages are used by routers to inform hosts of a better route for sending packets. By forging these messages, an attacker can manipulate the victim's routing table, causing network traffic destined for remote servers to be rerouted through the attacker’s device. This enables traffic interception, modification, or disruption, effectively facilitating man-in-the-middle (MitM) attacks. The attack vector requires the attacker to have local network access, which limits the scope but increases risk in environments such as public Wi-Fi or poorly segmented enterprise WLANs. The CVSS v3.1 score of 6.3 reflects medium severity, with attack vector being adjacent network, low attack complexity, requiring low privileges and some user interaction. The impact includes limited confidentiality and integrity loss, but high availability impact due to potential traffic disruption. No patches or exploits in the wild are currently reported, indicating the vulnerability is newly disclosed. However, the lack of patch availability necessitates immediate mitigation through network-level controls and monitoring.

Potential Impact

This vulnerability can have significant consequences for organizations relying on the affected TP-LINK router model in wireless environments. An attacker exploiting this flaw can hijack network traffic, potentially capturing sensitive data, injecting malicious content, or disrupting communications. This compromises confidentiality and integrity of data in transit and can lead to denial of service or further lateral movement within the network. The requirement for attacker proximity limits the threat to local wireless networks, but environments such as corporate WLANs, public hotspots, and shared residential networks are at risk. The disruption of availability can impact business operations, especially if critical services rely on the affected device for network connectivity. Additionally, the ability to redirect traffic can facilitate further attacks such as credential theft, malware injection, or surveillance. Organizations with high-value data or critical infrastructure connected via these routers face increased risk. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

Since no official patches are currently available for this vulnerability, organizations should implement the following specific mitigations: 1) Segment wireless networks to isolate critical systems and reduce the attack surface; 2) Disable ICMP redirect acceptance on client devices and routers where possible to prevent processing of forged messages; 3) Employ network intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious ICMP redirect traffic; 4) Enforce strong WLAN security controls such as WPA3 and robust authentication to limit unauthorized access; 5) Regularly audit and monitor network traffic for anomalies indicative of routing manipulation; 6) Educate users about risks of connecting to untrusted WLANs and encourage use of VPNs for sensitive communications; 7) Maintain up-to-date firmware and subscribe to vendor advisories for prompt patch application once available; 8) Consider replacing affected devices with models that have hardened ICMP handling if mitigation is not feasible. These targeted actions go beyond generic advice by focusing on network protocol controls and segmentation to reduce exploitation likelihood.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-10T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c6ab7ef31ef0b563d77

Added to database: 2/25/2026, 9:40:58 PM

Last enriched: 2/26/2026, 5:17:28 AM

Last updated: 2/26/2026, 6:14:20 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats