CVE-2024-37662: n/a
TP-LINK TL-7DR5130 v1.0.23 is vulnerable to TCP DoS or hijacking attacks. An attacker in the same WLAN as the victim can disconnect or hijack the traffic between the victim and any remote server by sending out forged TCP RST messages to evict NAT mappings in the router.
AI Analysis
Technical Summary
CVE-2024-37662 identifies a vulnerability in the TP-LINK TL-7DR5130 router firmware version 1.0.23, where the device improperly handles TCP reset (RST) packets within the same WLAN. The router maintains NAT mappings to translate internal IP addresses to external ones for outbound connections. An attacker on the same wireless network can craft and send forged TCP RST packets targeting active NAT sessions, causing the router to prematurely evict these mappings. This results in disruption of ongoing TCP connections, effectively causing denial of service (DoS) or enabling hijacking of traffic by manipulating session states. The vulnerability stems from insufficient validation of TCP RST packets, classified under CWE-940 (Improper Control of Generation of Code). Exploitation requires the attacker to have local network access (adjacent network attack vector), low attack complexity, and some user interaction, such as inducing the victim to initiate connections. The CVSS v3.1 base score is 6.3, reflecting medium severity with partial impact on confidentiality and integrity, and high impact on availability. No patches or known exploits are currently reported, but the flaw presents a significant risk in environments where multiple users share WLAN access and rely on this router model for network connectivity.
Potential Impact
The vulnerability allows attackers on the same wireless network to disrupt or hijack TCP connections by evicting NAT mappings, leading to denial of service or interception of sensitive data. This compromises the availability and integrity of network communications for affected users. Organizations relying on TP-LINK TL-7DR5130 routers in shared WLAN environments, such as small offices, public Wi-Fi hotspots, or residential networks, face increased risk of session disruption and potential data interception. The attack could degrade user experience, interrupt critical business applications, and expose confidential information if hijacked sessions carry sensitive data. Although exploitation requires local network access, the ease of sending forged TCP RST packets makes this a practical threat in environments with weak WLAN access controls. The absence of patches increases exposure duration, and the vulnerability could be leveraged in targeted attacks against organizations with strategic interests or high-value communications.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict WLAN access controls to limit attacker presence on the same network segment, including strong WPA3 encryption and client isolation features. Network segmentation should separate critical devices from general user access to reduce attack surface. Monitoring network traffic for abnormal volumes of TCP RST packets can help detect exploitation attempts. Administrators should regularly check for firmware updates from TP-LINK and apply patches promptly once released. Employing intrusion detection/prevention systems (IDS/IPS) capable of identifying forged TCP RST packets can provide additional defense. Encouraging users to avoid connecting to untrusted WLANs and using VPNs can reduce exposure. In the interim, consider replacing vulnerable devices with models that do not exhibit this flaw or have confirmed patches.
Affected Countries
United States, China, India, Brazil, Germany, United Kingdom, France, Russia, South Africa, Australia
CVE-2024-37662: n/a
Description
TP-LINK TL-7DR5130 v1.0.23 is vulnerable to TCP DoS or hijacking attacks. An attacker in the same WLAN as the victim can disconnect or hijack the traffic between the victim and any remote server by sending out forged TCP RST messages to evict NAT mappings in the router.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-37662 identifies a vulnerability in the TP-LINK TL-7DR5130 router firmware version 1.0.23, where the device improperly handles TCP reset (RST) packets within the same WLAN. The router maintains NAT mappings to translate internal IP addresses to external ones for outbound connections. An attacker on the same wireless network can craft and send forged TCP RST packets targeting active NAT sessions, causing the router to prematurely evict these mappings. This results in disruption of ongoing TCP connections, effectively causing denial of service (DoS) or enabling hijacking of traffic by manipulating session states. The vulnerability stems from insufficient validation of TCP RST packets, classified under CWE-940 (Improper Control of Generation of Code). Exploitation requires the attacker to have local network access (adjacent network attack vector), low attack complexity, and some user interaction, such as inducing the victim to initiate connections. The CVSS v3.1 base score is 6.3, reflecting medium severity with partial impact on confidentiality and integrity, and high impact on availability. No patches or known exploits are currently reported, but the flaw presents a significant risk in environments where multiple users share WLAN access and rely on this router model for network connectivity.
Potential Impact
The vulnerability allows attackers on the same wireless network to disrupt or hijack TCP connections by evicting NAT mappings, leading to denial of service or interception of sensitive data. This compromises the availability and integrity of network communications for affected users. Organizations relying on TP-LINK TL-7DR5130 routers in shared WLAN environments, such as small offices, public Wi-Fi hotspots, or residential networks, face increased risk of session disruption and potential data interception. The attack could degrade user experience, interrupt critical business applications, and expose confidential information if hijacked sessions carry sensitive data. Although exploitation requires local network access, the ease of sending forged TCP RST packets makes this a practical threat in environments with weak WLAN access controls. The absence of patches increases exposure duration, and the vulnerability could be leveraged in targeted attacks against organizations with strategic interests or high-value communications.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict WLAN access controls to limit attacker presence on the same network segment, including strong WPA3 encryption and client isolation features. Network segmentation should separate critical devices from general user access to reduce attack surface. Monitoring network traffic for abnormal volumes of TCP RST packets can help detect exploitation attempts. Administrators should regularly check for firmware updates from TP-LINK and apply patches promptly once released. Employing intrusion detection/prevention systems (IDS/IPS) capable of identifying forged TCP RST packets can provide additional defense. Encouraging users to avoid connecting to untrusted WLANs and using VPNs can reduce exposure. In the interim, consider replacing vulnerable devices with models that do not exhibit this flaw or have confirmed patches.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-06-10T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c6ab7ef31ef0b563d7a
Added to database: 2/25/2026, 9:40:58 PM
Last enriched: 2/26/2026, 5:17:40 AM
Last updated: 4/12/2026, 1:56:27 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.