TP-Link Archer AX21 - RCE (CVE-2023-1389)
TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.
CrowdSec analysis
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Exploit Timeline
This timeline shows the history of exploitation attempts for this CVE, as detected by the CrowdSec community.
Unlock the Exploitation timeline with the
CrowdSec Live Exploit Tracker plan
Protection
Find out relevant information to protect your stack against this CVE.