Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37662: n/a

0
Medium
VulnerabilityCVE-2024-37662cvecve-2024-37662
Published: Mon Jun 17 2024 (06/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-37662 is a medium-severity vulnerability affecting TP-LINK TL-7DR5130 routers running firmware version 1. 0. 23. An attacker located on the same WLAN as the victim can exploit this flaw by sending forged TCP RST packets to the router, causing it to evict NAT mappings. This results in denial of service or traffic hijacking between the victim and remote servers. The attack requires local network access, low complexity, and some user interaction. While no known exploits are currently in the wild, the vulnerability impacts confidentiality, integrity, and availability of network communications. Organizations using this router model in environments with shared wireless access are at risk. Mitigation involves network segmentation, monitoring for abnormal TCP RST traffic, and applying vendor patches once available. Countries with significant TP-LINK market presence and high WLAN usage are most likely affected.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:17:40 UTC

Technical Analysis

CVE-2024-37662 identifies a vulnerability in the TP-LINK TL-7DR5130 router firmware version 1.0.23, where the device improperly handles TCP reset (RST) packets within the same WLAN. The router maintains NAT mappings to translate internal IP addresses to external ones for outbound connections. An attacker on the same wireless network can craft and send forged TCP RST packets targeting active NAT sessions, causing the router to prematurely evict these mappings. This results in disruption of ongoing TCP connections, effectively causing denial of service (DoS) or enabling hijacking of traffic by manipulating session states. The vulnerability stems from insufficient validation of TCP RST packets, classified under CWE-940 (Improper Control of Generation of Code). Exploitation requires the attacker to have local network access (adjacent network attack vector), low attack complexity, and some user interaction, such as inducing the victim to initiate connections. The CVSS v3.1 base score is 6.3, reflecting medium severity with partial impact on confidentiality and integrity, and high impact on availability. No patches or known exploits are currently reported, but the flaw presents a significant risk in environments where multiple users share WLAN access and rely on this router model for network connectivity.

Potential Impact

The vulnerability allows attackers on the same wireless network to disrupt or hijack TCP connections by evicting NAT mappings, leading to denial of service or interception of sensitive data. This compromises the availability and integrity of network communications for affected users. Organizations relying on TP-LINK TL-7DR5130 routers in shared WLAN environments, such as small offices, public Wi-Fi hotspots, or residential networks, face increased risk of session disruption and potential data interception. The attack could degrade user experience, interrupt critical business applications, and expose confidential information if hijacked sessions carry sensitive data. Although exploitation requires local network access, the ease of sending forged TCP RST packets makes this a practical threat in environments with weak WLAN access controls. The absence of patches increases exposure duration, and the vulnerability could be leveraged in targeted attacks against organizations with strategic interests or high-value communications.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict WLAN access controls to limit attacker presence on the same network segment, including strong WPA3 encryption and client isolation features. Network segmentation should separate critical devices from general user access to reduce attack surface. Monitoring network traffic for abnormal volumes of TCP RST packets can help detect exploitation attempts. Administrators should regularly check for firmware updates from TP-LINK and apply patches promptly once released. Employing intrusion detection/prevention systems (IDS/IPS) capable of identifying forged TCP RST packets can provide additional defense. Encouraging users to avoid connecting to untrusted WLANs and using VPNs can reduce exposure. In the interim, consider replacing vulnerable devices with models that do not exhibit this flaw or have confirmed patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-10T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c6ab7ef31ef0b563d7a

Added to database: 2/25/2026, 9:40:58 PM

Last enriched: 2/26/2026, 5:17:40 AM

Last updated: 2/26/2026, 6:11:44 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats