When Your Router Becomes the Threat: The Hidden Risk Behind Unpatched TP-Link Devices

End-of-life TP-Link routers are being exploited using CVE-2023-33538 to deploy Mirai botnets. Learn how SMEs and charities can identify and mitigate the risk.

2 min read

A known vulnerability in several TP-Link routers is now being actively exploited by attackers to deploy Mirai-based botnet malware.

The flaw, tracked as CVE-2023-33538, affects multiple end-of-life (EOL) devices, meaning they no longer receive security updates from the vendor.

For many organisations, especially SMEs and charities, this creates a serious and often overlooked risk.

What’s Happening?

Attackers are targeting vulnerable TP-Link routers and using the flaw to:

  • Gain unauthorised access

  • Deploy Mirai botnet malware

  • Turn devices into part of a wider attack infrastructure

Once compromised, these routers can be used for:

  • Distributed Denial of Service (DDoS) attacks

  • Network pivoting into internal systems

  • Persistent access without detection

And because these devices sit at the edge of your network, they are often trusted and rarely monitored.

The Real Problem: End-of-Life Hardware

The key issue here isn’t just the vulnerability. It’s that there is no patch coming.

If you’re using an affected device:

  • You cannot fix it with an update

  • You cannot rely on vendor support

  • You remain exposed indefinitely

This is a common problem across many organisations where:

  • Network hardware is deployed and forgotten

  • Asset inventories are incomplete

  • Security updates are assumed but not verified

Why This Matters for SMEs and Charities

Many smaller organisations rely on:

  • Low-cost networking equipment

  • Long hardware replacement cycles

  • Limited internal IT/security visibility

This creates the perfect conditions for:

  • Outdated devices remaining in production

  • Exposure going unnoticed

  • Compromise persisting over long periods

How to Check If You’re at Risk

Start with a simple review:

  • Do you know what router/firewall models you are using?

  • Are any of them end-of-life?

  • Are they still receiving security updates?

  • Do you have visibility of external exposure?

If the answer is “I’m not sure” to any of these, that’s your starting point.

What You Should Do Now

If you’re using affected TP-Link devices:

1. Replace the hardware

There is no workaround that removes the risk entirely.

2. Segment your network

Limit what network devices can access internally.

3. Review external exposure

Understand what services are accessible from the internet.

4. Monitor for unusual behaviour

Look for:

  • Unexpected outbound traffic

  • Performance issues

  • Unknown connections

Final Thought

Not all vulnerabilities can be patched. And when they can’t, the risk doesn’t go away, it becomes permanent.

The question isn’t just:
“Are you vulnerable?”

It’s:
“Are you relying on devices that can no longer be secured?”