TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/174131/TP-Link-Archer-AX21-Command-Injection.html | Exploit Third Party Advisory VDB Entry |
https://www.tenable.com/security/research/tra-2023-11 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-03-15 23:15
Updated : 2024-06-27 19:30
NVD link : CVE-2023-1389
Mitre link : CVE-2023-1389
CVE.ORG link : CVE-2023-1389
JSON object : View
Products Affected
tp-link
- archer_ax21_firmware
- archer_ax21
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')