Comment on US Government Urges Total Ban of Our Most Popular Wi-Fi Router
apftwb@lemmy.world 3 days ago
Good. TPLink routers are cartoonishly insecure. They are consumer grade. A better solution is that the US establishes some minimum infosec standards for this equipment, but that would require time and thought.
ReluctantMuskrat@lemmy.world 3 days ago
Do you have any information to share about their bad security? I have a couple of their routers which seem to work quite well. Any I really at risk, and anymore than I would be with something from Linksys or Netgear?
apftwb@lemmy.world 1 day ago
Here are two new vulnerabilities from this month.
Here are some more exploits from 2023
Here are all the TPLink vulnerablies known publicly
For completeness here are Cisco’s and Netgear’s vulnerabilities
Infosec security is a journey, not a destination.
ReluctantMuskrat@lemmy.world 1 day ago
Thank you for that! I’m keeping the cvedetails link bookmarked.
My two devices, the Archer BE9300 router and the TL-WA3001 AP aren’t listed with any known vulnerabilities, though I suppose it may be they haven’t been tested. The BE9300 is pretty popular though so that would be surprising.
The known vulnerabilities in their other devices don’t appear malicious or any worse than other common vendors either however. Given the state of the US government and its desire to monitor it’s citizens, I can’t decide if it’s contempt for TP-Link is a bad thing or not. They might just be mad they can’t get the vendor to give them a backdoor.
apftwb@lemmy.world 1 day ago
I will add the following:
US was looking at this before Trump took office (Dec 2024)
itpro.com/…/the-us-could-be-set-to-ban-tp-link-ro…
TP Link’s sloppy security lead to the creation of a Chinese botnet.
cybernews.com/…/chinese-hackers-hijacked-thousand…
finitebanjo@lemmy.world 2 days ago
Replace the firmware on your current TPLink devices with OpenWRT, for a temporary solution.
ReluctantMuskrat@lemmy.world 2 days ago
A solution to what exactly? Nobody has provided any information about definitive risks.
An as OpenWRT goes it would either be a permanent solution or no solution at all. How would it be temporary?
finitebanjo@lemmy.world 1 day ago
Nowadays it wouldn’t surprise me if a secondary system was hidden on a chip on a router, meaning you could replace the main firmware and still be spied on, but as far as what the risk cited by US officials is then it’s probably something like being used as a sleeper device that will later be included in massive botnet attacks like the AISURU botnet well documented to be made up of compromised consumer devices.
My money would have been on Cisco rather than TP-Link, though.
spaghettiwestern@sh.itjust.works 1 day ago
OpenWRT is a permanent solution for older TP-Link routers. Their newer routers are locked down and not supported by OpenWRT.
jaxxed@lemmy.world 3 days ago
If you can, look for a mikrotik device, especially if you are in Europe. They are well established, not hard to use, but have extreme depth of features for advanced users, and they are not expensive.
ReluctantMuskrat@lemmy.world 2 days ago
I have one mikrotik poe AP I use and am quite happy with, but certainly not something I’d recommend for non-technical people because it’s firmware isn’t consumer friendly.
However my question is really what’s the real risk in using TP-Link devices. Neither the article or any of the comments link to any explanation of the actual risks. Is my network actually open to hackers now? Is my router able to be used for dos attacks or for other purposes now? Everyone is acting like their flaws are common knowledge and there’s zero info about genuine flaws or exploits.
PalmTreeIsBestTree@lemmy.world 2 days ago