Critical TP-Link Router Flaw Allows Full Device Takeover

Security researchers have detailed a critical remote code execution vulnerability (CVE-2025-9961) in the management protocol of certain TP-Link routers. The flaw stems from a stack-based buffer overflow that can be triggered by specially crafted requests, allowing an attacker to hijack the device's execution flow. To achieve exploitation, the researchers developed a complex attack chain that involved downgrading the firmware, building a custom server to deliver the payload, and brute-forcing memory protections. Their proof-of-concept successfully bypassed existing mitigations using a ret2libc technique to ultimately deploy a reverse shell and gain complete control over the router. The device manufacturer has since released firmware updates to address the vulnerability, and users are urged to apply them immediately.

Latest mentioned: 09-22
Earliest mentioned: 09-18
Critical TP-Link Router Flaw Allows Full Device Takeover | Cyber Digests | Cyber Digests