PT-2023-2025 · Tp Link · Tp-Link Archer Ax21
Evan Grant
+1
·
Published
2023-03-14
·
Updated
2025-11-18
·
CVE-2023-1389
CVSS v3.1
8.8
8.8
High
| Base vector | Vector | AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
TP-Link Archer AX21 firmware versions prior to 1.1.4 Build 20230219
TP-Link Archer AX-21
Description
TP-Link Archer AX21 (AX1800) devices are affected by a command injection vulnerability in the /cgi-bin/luci;stok=/locale endpoint. The vulnerability occurs because the
country parameter within the write operation is not properly sanitized before being used in a call to popen(). This allows an unauthenticated attacker to inject arbitrary commands, which are then executed with root privileges via a simple POST request. This vulnerability has been actively exploited by multiple botnets, including Ballista, Moobot, Miroi, AGoent, and Gafgyt, to spread malware and launch DDoS attacks. The vulnerability is identified as CVE-2023-1389. Numerous reports indicate ongoing exploitation attempts, with daily infection attempts exceeding 40,000 since March 2024. The vulnerability allows attackers to execute remote code, potentially compromising devices and networks.Recommendations
Update TP-Link Archer AX21 firmware to version 1.1.4 Build 20230219 or later.
For all other affected TP-Link Archer AX-21 models, update to the latest available firmware.
Exploit
Fix
RCE
Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2023-01736
CVE-2023-1389
ZDI-23-451
Affected Products
Tp-Link Archer Ax21
References · 196
- 🔥 https://github.com/Terminal1337/CVE-2023-1389⭐ 12 🔗 3 · Exploit
- 🔥 https://github.com/Voyag3r-Security/CVE-2023-1389⭐ 8 🔗 5 · Exploit
- 🔥 http://packetstormsecurity.com/files/174131/TP-Link-Archer-AX21-Command-Injection.html · Exploit
- 🔥 https://exploit-db.com/exploits/51677 · Exploit
- 🔥 https://tenable.com/security/research/tra-2023-11 · Exploit
- https://tp-link.com/us/support/download/archer-ax21/v3/#Firmware · Security Note
- https://bdu.fstec.ru/vul/2023-01736 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2023-1389 · Security Note
- https://zerodayinitiative.com/advisories/ZDI-23-451 · Security Note
- https://github.com/CronUp/EnAnalisis⭐ 42 🔗 6 · Note
- https://t.me/aptreports/4497 · Telegram Post
- https://twitter.com/TweetThreatNews/status/1899569906611261689 · Twitter Post
- https://twitter.com/threatintel/status/1900120263594803633 · Twitter Post
- https://twitter.com/transilienceai/status/1799263090673938487 · Twitter Post
- https://twitter.com/F5Labs/status/1834685768356577509 · Twitter Post