TP-Link routers can be hacked: What to do now

TP-Link Archer C5 router
(Image credit: TP-Link)

Look out, TP-Link router owners. IBM X-Force researchers have found a flaw in some models that lets miscreants hijack the devices simply by entering a password that's too long. 

Yep, that's right. Any overly long password creates a data overflow that busts down the gates and lets anyone in as the device administrator. 

The attacker only has to use the ancient Telnet protocol to connect to the router on the local network, then make it look like a login request comes from the web address "tplinkwifi.net", the same address TP-Link routers use during setup. None of this is hard to do.

Even worse, the attack would nix the legitimate owner's administrative password and freeze them out. The attacker could also flip on remote access to get permanent access to the router, or direct user web traffic to malicious sites.

The exploit works on three LTE-based routers sold in the European Union: the Archer MR200 version 4, Archer MR400 version 3 and Archer MR6400 version 4. It also works on the TP-Link Archer C5 AC1200 home Wi-Fi router, sold in many countries, but the vulnerable hardware version for that model is version 4, which has not been released in North America or the EU. 

Now comes the fun part. Some newer TP-Link routers (there's a list here) let you update their firmware by going to their administrative interfaces -- the already-mentioned tplinkwifi.net -- and logging in as an administrator. (The factory-default administrator credentials are username "admin" and password "admin", which are just God-awful and which you should change immediately.)

From there, you would go to the Advanced tab in the admin interface, scroll down to the System Tools section, click on Firmware Upgrade and click Check for Upgrade or Check for Update. There may also be a notification in the upper right corner of the admin interface that an update is available. TP-Link has illustrated instructions under "Case 2" here.

Our own Marshall Honorof suggests that you back up your TP-Link router's settings by using the Backup & Restore feature in System Tools before you do the firmware update, as the update may throw the router back to factory settings. Once that's done, you can return to Firmware Upgrade and follow the instructions.

Unfortunately, the four models shown to be affected by this flaw don't seem to be on the easy-update list. That means you'll have to do it all manually, and it's not something many people will understand how to do. 

You'll have to download the firmware-update files to a PC, unzip the compressed files, connect the PC to the router via an Ethernet cable, go into the administrative interface as directed above, go to the Firmware Update/Upgrade section as above and then browse to the firmware-update file on your PC to install it. TP-Link's illustrated instructions are here.

But hold on -- you do NOT want to update the firmware manually unless you're certain you have the correct regional version and hardware version. Installing the wrong firmware could permanently brick your router. You can usually make certain by checking the sticker on the bottom of the router, as TP-Link explains here

Here are links to the firmware for each of these models:

We would normally suggest that you update your firmware on any model of TP-Link router anyway, as there may be other vulnerable models that the IBM X-Force researchers did not test. 

But manually updating the firmware on older TP-Link routers is so involved and risky that we can't recommend doing so unless it's absolutely necessary.

TOPICS
Paul Wagenseil

Paul Wagenseil is a senior editor at Tom's Guide focused on security and privacy. He has also been a dishwasher, fry cook, long-haul driver, code monkey and video editor. He's been rooting around in the information-security space for more than 15 years at FoxNews.com, SecurityNewsDaily, TechNewsDaily and Tom's Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown up in random TV news spots and even moderated a panel discussion at the CEDIA home-technology conference. You can follow his rants on Twitter at @snd_wagenseil.

Read more
A person trying to set up a new Wi-Fi router
Thousands of TP-Link routers have been infected by a botnet to spread malware
Graphic of fibre optic cables attacking code
An estimated 46,000 VPN servers are vulnerable to being hijacked
A Wi-Fi router next to a phone with a lock symbol on the screen
Massive MikroTik router botnet has been spreading malware – here’s how to stay safe
Red computer security warning
2.8 million IP addresses being used in brute force attack on VPNs
Windows
240 million Windows 10 users are vulnerable to six different hacker exploits — protect yourself now
Image of technical screen displaying system hacked warning
SonicWall VPN hit with second vulnerability
Latest in Routers
The eero Pro 7 next to the eero Max 7 on a desk
Eero Pro 7 vs Eero Max 7: Which Wi-Fi 7-powered eero mesh system should you buy?
Eero Pro 7 sitting on counter
Eero Pro 7 review: Fast Wi-Fi 7 mesh speeds simplified
Netgear Orbi 873 on desk
Netgear Orbi 870 review: A great Wi-Fi 7 mesh kit for long range performance
TP-Link's Deco BE65-Outdoor Wi-Fi 7 mesh node mounted to a pole at CES 2025
TP-Link’s new outdoor mesh extender will give you true Wi-Fi 7 speeds right in your backyard
The MSI Roammii BE Lite dual-band mesh Wi-Fi 7 router on a table
Upgrading to Wi-Fi 7 is about to get more complicated — and these new routers are to blame
TP- Link Archer AX55 sitting on desk
This Chinese router company with 65% market share in the US could be banned — what you need to know
Latest in News
iPhone 16 Pro vs iPhone 16 Pro Max in hand showing displays
Forget iPhone 17 — iPhone 18 could get this huge upgrade
The new Husqvarna iQ series robot lawn mower.
Husqvarna’s new robot mowers offer GPS for less
Rendered images of rumored foldable iPhone.
Foldable iPhone report just revealed key details — here's what we know
NYTimes Connections
NYT Connections today hints and answers — Saturday, March 23 (#651)
NYT Strands on a cellphone
NYT Strands today — hints, spangram and answers for game #385 (Sunday, March 23 2025)
Nintendo Switch 2
Nintendo Switch 2 rumored specs — here’s what we know so far