• ReluctantMuskrat@lemmy.world
    link
    fedilink
    English
    arrow-up
    14
    ·
    1 day ago

    Do you have any information to share about their bad security? I have a couple of their routers which seem to work quite well. Any I really at risk, and anymore than I would be with something from Linksys or Netgear?

    • apftwb@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      edit-2
      2 hours ago

      Here are two new vulnerabilities from this month.

      Here are some more exploits from 2023

      Here are all the TPLink vulnerablies known publicly

      Am I really at risk, and anymore than I would be with something from Linksys or Netgear?

      As always, depends on your threat model. I have cheap TPLink switch in my home network because its cheap and kept behind a pfsense firewall. The TPLink switch is not allowed to talk to the internet. This is good enough for me as I don’t have a threat model where something attacks the switch from inside my network.

      For completeness here are Cisco’s and Netgear’s vulnerabilities. Infosec security is a journey, not a destination.

      • ReluctantMuskrat@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 hour ago

        Thank you for that! I’m keeping the cvedetails link bookmarked.

        My two devices, the Archer BE9300 router and the TL-WA3001 AP aren’t listed with any known vulnerabilities, though I suppose it may be they haven’t been tested. The BE9300 is pretty popular though so that would be surprising.

        The known vulnerabilities in their other devices don’t appear malicious or any worse than other common vendors either however. Given the state of the US government and its desire to monitor it’s citizens, I can’t decide if it’s contempt for TP-Link is a bad thing or not. They might just be mad they can’t get the vendor to give them a backdoor.

      • ReluctantMuskrat@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        3 hours ago

        A solution to what exactly? Nobody has provided any information about definitive risks.

        An as OpenWRT goes it would either be a permanent solution or no solution at all. How would it be temporary?

        • finitebanjo@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          2 hours ago

          Nowadays it wouldn’t surprise me if a secondary system was hidden on a chip on a router, meaning you could replace the main firmware and still be spied on, it’s better to have hardware you can trust top to bottom from the country you live in, but as far as what the risk cited by US officials is then it’s probably something like being used as a sleeper device that will later be included in massive botnet attacks like the AISURU botnet well documented to be made up of compromised consumer devices.

          My money would have been on Cisco rather than TP-Link, though.

    • jaxxed@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      1 day ago

      If you can, look for a mikrotik device, especially if you are in Europe. They are well established, not hard to use, but have extreme depth of features for advanced users, and they are not expensive.

      • ReluctantMuskrat@lemmy.world
        link
        fedilink
        English
        arrow-up
        15
        ·
        1 day ago

        I have one mikrotik poe AP I use and am quite happy with, but certainly not something I’d recommend for non-technical people because it’s firmware isn’t consumer friendly.

        However my question is really what’s the real risk in using TP-Link devices. Neither the article or any of the comments link to any explanation of the actual risks. Is my network actually open to hackers now? Is my router able to be used for dos attacks or for other purposes now? Everyone is acting like their flaws are common knowledge and there’s zero info about genuine flaws or exploits.

        • PalmTreeIsBestTree@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 day ago

          Honestly, I wouldn’t use them in a commercial or business setting but if you are not a criminal (FBI might do some snooping), then I don’t think anyone is going to try to hack your local network lol.

          • HertzDentalBar@lemmy.blahaj.zone
            link
            fedilink
            English
            arrow-up
            13
            ·
            22 hours ago

            But that’s not really answering anything. Why? What makes their products more insecure or hackable than other brands? Like do they have ports open by defaults? Is the interface they use insecure and easily hacked? Or is this purely a “were not sure exactly but they probably have a back door”