CVE-2023-1389

Published Mar 15, 2023

Last updated 5 months ago

Overview

Description
TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.
Source
vulnreport@tenable.com
NVD status
Analyzed

Social media

Hype score
Not currently trending

Risk scores

CVSS 3.1

Type
Primary
Base score
8.8
Impact score
5.9
Exploitability score
2.8
Vector string
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

Known exploits

Data from CISA

Vulnerability name
TP-Link Archer AX-21 Command Injection Vulnerability
Exploit added on
May 1, 2023
Exploit action due
May 22, 2023
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-77

Configurations