VPNFilter Malware Security

Security Advisory
Updated 09-29-2019 09:41:35 AM 95998

We at TP-Link are aware of the new security vulnerability named “VPN Filter” which may bring risks to some routers. According to the Cisco Talos’s investigation, this security vulnerability may take use of the existing vulnerabilities on the devices and try to launch attacks. Up till now, we did not receive any new vulnerability feedback and as for the existing old ones, we have already fixed them via firmware release.

To protect against this possible malware, we strongly advise our customers to take following steps:

1. Make sure you are running the latest firmware version on your router.

You can check if the firmware running on your device is latest or not via this link:

https://www.tp-link.com/support/download/

2. Please change default admin username and password on the web interface. For more detailed operation, you can refer to this link:

https://www.tp-link.com/support/faq/73/.

3. If remote management feature is not necessary for you, please turn off Remote Management on the web interface. As if remote management feature is configured improperly, it will enhance possibility of attacks.

4. If you concern that your router might be attacked, you may try to restore factory default settings of your router first and then take steps above.

TP-Link is investigating and will update this advisory as more information becomes available.

Is this faq useful?

Your feedback helps improve this site.

Community

TP-Link Community

Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.

Visit the Community >

From United States?

Get products, events and services for your region.