TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.
https://hackread.com/androxgh0st-botnet-integrate-mozi-iot-vulnerabilities/
https://www.akamai.com/blog/security-research/2024-redtail-cryptominer-pan-os-cve-exploit
https://blog.xlab.qianxin.com/catddos-derivative-en/
https://isc.sans.edu/diary/rss/30418
https://www.tenable.com/security/research/tra-2023-11
http://packetstormsecurity.com/files/174131/TP-Link-Archer-AX21-Command-Injection.html