VPNFilter Malware Security
We at TP-Link are aware of the new security vulnerability named “VPN Filter” which may bring risks to some routers. According to the Cisco Talos’s investigation, this security vulnerability may take use of the existing vulnerabilities on the devices and try to launch attacks. Up till now, we did not receive any new vulnerability feedback and as for the existing old ones, we have already fixed them via firmware release.
To protect against this possible malware, we strongly advise our customers to take following steps:
1. Make sure you are running the latest firmware version on your router.
You can check if the firmware running on your device is latest or not via this link:
2. Please change default admin username and password on the web interface. For more detailed operation, you can refer to this link:
3. If remote management feature is not necessary for you, please turn off Remote Management on the web interface. As if remote management feature is configured improperly, it will enhance possibility of attacks.
4. If you concern that your router might be attacked, you may try to restore factory default settings of your router first and then take steps above.
TP-Link is investigating and will update this advisory as more information becomes available.
Is this faq useful?
Your feedback helps improve this site.