Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

CISA Sounds Alarm Over TP-Link Wireless Routers Under Attack: A Growing Concern for Cybersecurity



CISA Sounds Alarm Over TP-Link Wireless Routers Under Attack: A Growing Concern for Cybersecurity

The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about two vulnerabilities in TP-Link wireless routers that have been exploited in the wild. The alert comes as concerns over cybersecurity continue to grow, with TP-Link's close ties to the Chinese government raising questions about its impact on American users. With organizations urged to prioritize timely remediation of vulnerabilities and take proactive steps to address potential security issues, it is clear that this issue will be a pressing concern for some time to come.

  • TP-Link routers have been identified as being under active attack due to two identified flaws.
  • The first flaw, CVE-2023-50224, allows attackers to obtain authentication credentials by subverting the httpd protocol.
  • The second flaw, CVE-2025-9377, exposes routers to remote code execution.
  • TP-Link's close ties with the Chinese government pose a risk to American users.
  • A recent TP-Link flaw related to CWMP leaves routers prone to crashing.
  • The importance of software bill-of-materials security checks cannot be overstated.



  • In a recent alert issued by the US Cybersecurity and Infrastructure Security Agency (CISA), it has come to light that two flaws in routers made by Chinese networking firm TP-Link have been identified as being under active attack. This development raises significant concerns regarding the cybersecurity of organizations that utilize these routers, highlighting the need for prompt remediation and vigilance in the face of such threats.

    The first flaw, CVE-2023-50224, allows an attacker without authentication to obtain authentication credentials by subverting the httpd protocol. This vulnerability enables malicious actors to gain access to sensitive information, including login credentials, making it essential for organizations to address this issue promptly.

    In addition to the aforementioned vulnerability, a second flaw, CVE-2025-9377, exposes the Archer C7(EU) V2 and TL-WR841N/ND(MS) V9 routers to remote code execution. This means that an attacker can potentially execute malicious code on these routers, compromising their security and potentially leading to further vulnerabilities.

    The growing influence of TP-Link in the American hardware market has already been noted by Rob Joyce, former head of the NSA's hacking team. He observed that TP-Link had grown its market share in the US from 10 percent in 2019 to nearly 60 percent by selling its kits at a loss. This significant increase in market share is believed to be linked to TP-Link's close ties with the Chinese government, which poses a risk to American users.

    The recent disclosure of another TP-Link flaw, related to the Customer Premises Equipment WAN Management Protocol (CWMP), has further highlighted the need for vigilance. This bug leaves routers prone to crashing, potentially leading to more significant security issues down the line.

    Google recently addressed concerns regarding Gmail, categorically denying that the email service had been hacked. However, this was in response to reports claiming that Gmail's 1.8 billion users were vulnerable to attack due to a misunderstanding over anti-phishing emails sent out by the company.

    The importance of software bill-of-materials security checks cannot be overstated. The NSA and security agencies from 19 other nations have come together to push for companies to insist on such checks before trusting code. This is seen as a way to promote transparency, align technical approaches, and leverage automation in order to strengthen the resilience of the global software ecosystem.

    In conclusion, the recent alerts by CISA regarding TP-Link routers under attack serve as a stark reminder of the ongoing threat landscape in cybersecurity. It is imperative that organizations prioritize timely remediation of vulnerabilities and take proactive steps to address potential security issues. By doing so, they can mitigate the risk of falling prey to sophisticated attacks and ensure the continued safety and security of their networks.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/CISA-Sounds-Alarm-Over-TP-Link-Wireless-Routers-Under-Attack-A-Growing-Concern-for-Cybersecurity-ehn.shtml

  • https://go.theregister.com/feed/www.theregister.com/2025/09/08/infosec_in_brief/

  • https://nvd.nist.gov/vuln/detail/CVE-2023-50224

  • https://www.cvedetails.com/cve/CVE-2023-50224/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-9377

  • https://www.cvedetails.com/cve/CVE-2025-9377/

  • https://hivepro.com/threat-advisory/operation-hankook-phantom-apt37s-stealthy-espionage-campaign/

  • https://www.socinvestigation.com/comprehensive-list-of-apt-threat-groups-motives-and-attack-methods/

  • https://attack.mitre.org/groups/G0016/

  • https://socradar.io/apt-profile-cozy-bear-apt29/

  • https://attack.mitre.org/groups/G0096/

  • https://www.fbi.gov/wanted/cyber/apt-41-group


  • Published: Mon Sep 8 12:15:00 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us