this post was submitted on 31 Oct 2025
309 points (97.5% liked)

Technology

76581 readers
2496 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] apftwb@lemmy.world 26 points 3 days ago* (last edited 3 days ago) (1 children)

Good. TPLink makes cartoonishly insecure consumer grade equipment. A better solution is that the US establishes some minimum infosec standards for this equipment, but that would require time and thought.

[–] ReluctantMuskrat@lemmy.world 13 points 3 days ago (3 children)

Do you have any information to share about their bad security? I have a couple of their routers which seem to work quite well. Any I really at risk, and anymore than I would be with something from Linksys or Netgear?

[–] apftwb@lemmy.world 8 points 2 days ago* (last edited 2 days ago) (1 children)

Here are two new vulnerabilities from this month.

Here are some more exploits from 2023

Here are all the TPLink vulnerablies known publicly

Am I really at risk, and anymore than I would be with something from Linksys or Netgear?

As always, depends on your threat model. I have cheap TPLink switch in my home network because its cheap and kept behind a pfsense firewall. The TPLink switch is not allowed to talk to the internet. This is good enough for me as I don't have a threat model where something attacks the switch from inside my network.

For completeness here are Cisco's and Netgear's vulnerabilities. Infosec security is a journey, not a destination.

[–] ReluctantMuskrat@lemmy.world 2 points 2 days ago (1 children)

Thank you for that! I'm keeping the cvedetails link bookmarked.

My two devices, the Archer BE9300 router and the TL-WA3001 AP aren't listed with any known vulnerabilities, though I suppose it may be they haven't been tested. The BE9300 is pretty popular though so that would be surprising.

The known vulnerabilities in their other devices don't appear malicious or any worse than other common vendors either however. Given the state of the US government and its desire to monitor it's citizens, I can't decide if it's contempt for TP-Link is a bad thing or not. They might just be mad they can't get the vendor to give them a backdoor.

[–] apftwb@lemmy.world 1 points 1 day ago

I will add the following:

US was looking at this before Trump took office (Dec 2024)

https://www.itpro.com/security/the-us-could-be-set-to-ban-tp-link-routers

TP Link's sloppy security lead to the creation of a Chinese botnet.

https://cybernews.com/security/chinese-hackers-hijacked-thousands-of-tp-link-wifi-routers/

[–] finitebanjo@lemmy.world 4 points 2 days ago (2 children)

Replace the firmware on your current TPLink devices with OpenWRT, for a temporary solution.

[–] ReluctantMuskrat@lemmy.world 7 points 2 days ago (1 children)

A solution to what exactly? Nobody has provided any information about definitive risks.

An as OpenWRT goes it would either be a permanent solution or no solution at all. How would it be temporary?

[–] finitebanjo@lemmy.world 0 points 2 days ago* (last edited 2 days ago) (1 children)

Nowadays it wouldn't surprise me if a secondary system was hidden on a chip on a router, meaning you could replace the main firmware and still be spied on, it's better to have hardware you can trust top to bottom from the country you live in, but as far as what the risk cited by US officials is then it's probably something like being used as a sleeper device that will later be included in massive botnet attacks like the AISURU botnet well documented to be made up of compromised consumer devices.

My money would have been on Cisco rather than TP-Link, though.

[–] kayohtie@pawb.social 1 points 2 days ago

It'd have to literally be a full CPU that somehow has only read access to the RAM such that it'd be a genuine feat of engineering. Either that or the whole thing is just a virtualized device, but the cooling demands for either method would exceed the threshold for passive cooling in those enclosures and require fans at that point.

Bloomberg wrote an article several years ago that was absolutely slaughtered for making up from bad sources such a chip concept except even more unbelievable because they claimed it was hidden inside the PCB itself and only like 6 or 8 pins? Absolutely absurd for anyone who understands electrical engineering or microcontrollers at all.

OpenWRT is a permanent solution for older TP-Link routers. Their newer routers are locked down and not supported by OpenWRT.

[–] jaxxed@lemmy.world 1 points 3 days ago (1 children)

If you can, look for a mikrotik device, especially if you are in Europe. They are well established, not hard to use, but have extreme depth of features for advanced users, and they are not expensive.

[–] ReluctantMuskrat@lemmy.world 14 points 3 days ago (1 children)

I have one mikrotik poe AP I use and am quite happy with, but certainly not something I'd recommend for non-technical people because it's firmware isn't consumer friendly.

However my question is really what's the real risk in using TP-Link devices. Neither the article or any of the comments link to any explanation of the actual risks. Is my network actually open to hackers now? Is my router able to be used for dos attacks or for other purposes now? Everyone is acting like their flaws are common knowledge and there's zero info about genuine flaws or exploits.