PT-2023-2025 · Tp Link · Tp-Link Archer Ax21

Evan Grant

+1

·

Published

2023-03-14

·

Updated

2025-11-18

·

CVE-2023-1389

CVSS v3.1
8.8
VectorAV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions TP-Link Archer AX21 firmware versions prior to 1.1.4 Build 20230219 TP-Link Archer AX-21
Description TP-Link Archer AX21 (AX1800) devices are affected by a command injection vulnerability in the /cgi-bin/luci;stok=/locale endpoint. The vulnerability occurs because the
country
parameter within the
write
operation is not properly sanitized before being used in a call to
popen()
. This allows an unauthenticated attacker to inject arbitrary commands, which are then executed with root privileges via a simple POST request. This vulnerability has been actively exploited by multiple botnets, including Ballista, Moobot, Miroi, AGoent, and Gafgyt, to spread malware and launch DDoS attacks. The vulnerability is identified as CVE-2023-1389. Numerous reports indicate ongoing exploitation attempts, with daily infection attempts exceeding 40,000 since March 2024. The vulnerability allows attackers to execute remote code, potentially compromising devices and networks.
Recommendations Update TP-Link Archer AX21 firmware to version 1.1.4 Build 20230219 or later. For all other affected TP-Link Archer AX-21 models, update to the latest available firmware.

Exploit

Fix

RCE

Command Injection

Weakness Enumeration

Related Identifiers

BDU:2023-01736
CVE-2023-1389
ZDI-23-451

Affected Products

Tp-Link Archer Ax21