VPNFilter Malware Security

Security Advisory
수정일09-29-2019 09:41:35 AM 93862

We at TP-Link are aware of the new security vulnerability named “VPN Filter” which may bring risks to some routers. According to the Cisco Talos’s investigation, this security vulnerability may take use of the existing vulnerabilities on the devices and try to launch attacks. Up till now, we did not receive any new vulnerability feedback and as for the existing old ones, we have already fixed them via firmware release.

To protect against this possible malware, we strongly advise our customers to take following steps:

1. Make sure you are running the latest firmware version on your router.

You can check if the firmware running on your device is latest or not via this link:

https://www.tp-link.com/support/download/

2. Please change default admin username and password on the web interface. For more detailed operation, you can refer to this link:

https://www.tp-link.com/support/faq/73/.

3. If remote management feature is not necessary for you, please turn off Remote Management on the web interface. As if remote management feature is configured improperly, it will enhance possibility of attacks.

4. If you concern that your router might be attacked, you may try to restore factory default settings of your router first and then take steps above.

TP-Link is investigating and will update this advisory as more information becomes available.

해당 FAQ가 유용했나요?

여러분의 의견은 사이트 개선을 위해 소중하게 사용됩니다.

From United States?

해당 지역의 제품, 이벤트 및 서비스를 받아보세요.