TP-LINK TL-7DR5130 v1.0.23 is vulnerable to TCP DoS or hijacking attacks. An attacker in the same WLAN as the victim can disconnect or hijack the traffic between the victim and any remote server by sending out forged TCP RST messages to evict NAT mappings in the router.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Jun 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Tp-link
Tp-link tl-7dr5130 Tp-link tl-7dr5130 Firmware |
|
CPEs | cpe:2.3:h:tp-link:tl-7dr5130:-:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-7dr5130_firmware:1.0.23:*:*:*:*:*:*:* |
|
Vendors & Products |
Tp-link
Tp-link tl-7dr5130 Tp-link tl-7dr5130 Firmware |
Wed, 14 Aug 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-940 | |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published: 2024-06-17T00:00:00
Updated: 2024-08-14T14:05:06.982Z
Reserved: 2024-06-10T00:00:00
Link: CVE-2024-37662

Updated: 2024-08-02T03:57:39.613Z

Status : Analyzed
Published: 2024-06-17T18:15:17.560
Modified: 2025-06-06T17:09:55.507
Link: CVE-2024-37662

No data.