The MikroTik Router hAP Lite 6.25 has no protection mechanism for unsolicited TCP ACK packets in the case of a fast network connection, which allows remote malicious users to cause a denial of service (CPU consumption) by sending many ACK packets. After the attacker stops the exploit, the CPU usage is 100% and the router requires a reboot for normal operation.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mikrotik routeros 6.25 |