About DNS hijacking
I'm reporting an unbypassable transparent DNS proxy on an Archer BE7200. The device intercepts all user-configured DoH and DoT traffic and forcibly redirects traffic to a buried endpoint, ignoring the settings in the Network > Internet > Advanced DNS panel. This constitutes DNS hijacking and prevents the use of third-party parental control and security services. Please provide a firmware update that provides an option to disable this interference.
- Copy Link
- Subscribe
- Bookmark
- Report Inappropriate Content
Hello @Jonturk ,
Thanks for contacting our community.
Have you changed any settings recently? Could these changes have caused this anomaly?
Please refer to the FAQs below to collect system logs and backup files of the router:
How to view and save System Log of TP-Link wireless router
How to create and restore from a backup file on your TP-Link Router
The tech team has been made aware of your case; they will likely reach out to you via email to continue troubleshooting. Please check your email inbox and confirm.
- Copy Link
- Report Inappropriate Content
Hello @Jonturk ,
Thanks for contacting our community.
Have you changed any settings recently? Could these changes have caused this anomaly?
Please refer to the FAQs below to collect system logs and backup files of the router:
How to view and save System Log of TP-Link wireless router
How to create and restore from a backup file on your TP-Link Router
The tech team has been made aware of your case; they will likely reach out to you via email to continue troubleshooting. Please check your email inbox and confirm.
- Copy Link
- Report Inappropriate Content
Most likely the Homeshield if you're using it and have the router tied to a TP-Link account.
- Copy Link
- Report Inappropriate Content
@Joseph-TP completely ignores the actually question/request. The tp-link router is emplying DNS hijacking even when trying to avoid it.
Requester (and me) want to disable this blanet security risk. It also hurts the performance on doing this.
This can be tested best with your tplinkwifi.net resolves to what ever the it thinks router is, even if you have employed steps to avoid it or even internally assign tplinkwifi.net.
Also, the router leaves port 53 open on the outside. This is a No-No. (I've done a work around forwarding 53 externally to an internal BS ip)
So We need 3 things
1. Disable DNS Hijacking/DNS proxy (what original poster is requesting)
2. Disable DNS on outside interface (dont know how the internet as a whole isn't screaming about this esay way to DOS a user that you left open)
3. Way to completely disable DNS being hosted on device.
- Copy Link
- Report Inappropriate Content
Information
Helpful: 1
Views: 412
Replies: 3
