TPG Community

Get online support

Archer VR1600v Router Vulnerable...Firmware Upgrade??

Calvinator
Level 2

Hello,

I've just received a notification from AVG telling me that my Archer VR1600v router is at risk because of an open port. It's telling me the CWMP port is reachable from the Internet and is vulnerable to attackers.

 

My current firmware for the router is:
Firmware Version:0.1.0 0.9.1 v5006.0 Build 200810 Rel.53181n Hardware Version:Archer VR1600v v1 00000000

Is there a way to fix this?

Thanks in advance for your help,
Calvin

4 REPLIES 4
Shane
Moderator

Hi @Calvinator ,

 

Thanks for raising this to us. I can confirm that the modem/router has the latest firmware version. This has been raised to our Network Engineering Team for investigation, I will provide an update on this thread when it becomes available.

Regards,

 


@Calvinator wrote:

Hello,

I've just received a notification from AVG telling me that my Archer VR1600v router is at risk because of an open port. It's telling me the CWMP port is reachable from the Internet and is vulnerable to attackers.

 

My current firmware for the router is:
Firmware Version:0.1.0 0.9.1 v5006.0 Build 200810 Rel.53181n Hardware Version:Archer VR1600v v1 00000000

Is there a way to fix this?

Thanks in advance for your help,
Calvin


 

david64
Level 11

@Shane .

The open port is 7547 which is used for CWMP (another form of remote router management; uses auto-config server). Using mobile data, I can browse to port 7547 on my router. It returns a string "File not found". The VR1600 manual shows the CWMP config screen (TPG has removed this from access by local admin user). It uses two passwords so hopefully they are strong ones to prevent hacking.

It looks like port 7547 has been invisibly reserved by the firmware; it can't be forwarded like a virtual server; it can't be used for Remote Management.

@Calvinator .

Calvinator
Level 2

Hi @david64,

Thanks for your response (and thanks to@Shane as well) Smiley Happy
So are you saying that, as long as my router's password is strong enough, I can ignore the warning from AVG and that the router won't be vulnerable to attacks?

david64
Level 11

@Calvinator . It's up to the engineering team to comment on whether the router is safe regarding CWMP function. The userids and passwords here are separate from the userid/password for local admin.

The other thing you can try, although AVG didn't report it:

use your phone's mobile data and browser, put your router's public ip address in the address bar and enter.

See what you get back. This tests whether port 80 is open or not. The default admin password for local router admin should be safe enough because no-one from outside should be able to connect to it.