CVE-2023-1389

high

Description

TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.

References

https://hackread.com/androxgh0st-botnet-integrate-mozi-iot-vulnerabilities/

https://blog.checkpoint.com/research/july-2024s-most-wanted-malware-remcos-and-ransomhub-run-rampant/

https://www.akamai.com/blog/security-research/2024-redtail-cryptominer-pan-os-cve-exploit

https://blog.xlab.qianxin.com/catddos-derivative-en/

https://www.fortinet.com/blog/threat-research/botnets-continue-exploiting-cve-2023-1389-for-wide-scale-spread?&web_view=true

https://isc.sans.edu/diary/rss/30418

https://www.tenable.com/security/research/tra-2023-11

http://packetstormsecurity.com/files/174131/TP-Link-Archer-AX21-Command-Injection.html

Details

Source: Mitre, NVD

Published: 2023-03-15

Updated: 2024-06-27

Risk Information

CVSS v2

Base Score: 8.3

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: High