The MikroTik Router hAP Lite 6.25 has no protection mechanism for unsolicited TCP ACK packets in the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many ACK packets. After the attacker stops the exploit, the CPU usage is 100% and the router requires a reboot for normal operation.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/41601/ | exploit vdb entry third party advisory |
https://cxsecurity.com/issue/WLB-2017030029 | third party advisory exploit |
https://packetstormsecurity.com/files/141449/Mikrotik-Hap-Lite-6.25-Denial-Of-Service.html | exploit vdb entry third party advisory |
http://www.exploitalert.com/view-details.html?id=26137 | third party advisory exploit |