Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2023-1389

Description

TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.

POC

Reference

- http://packetstormsecurity.com/files/174131/TP-Link-Archer-AX21-Command-Injection.html

- https://www.tenable.com/security/research/tra-2023-11

Github

- https://github.com/AzhariRamadhan/CVE-tplink-cp210-Command-Injection

- https://github.com/BrandonFanti/FoWL

- https://github.com/Co5mos/nuclei-tps

- https://github.com/DinoBytes/RVASec-2024-Consumer-Routers-Still-Suck

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/Terminal1337/CVE-2023-1389

- https://github.com/Voyag3r-Security/CVE-2023-1389

- https://github.com/ahisec/nuclei-tps

- https://github.com/fkie-cad/nvd-json-data-feeds

- https://github.com/infcodev/pentesting_scripts

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/ohnahee/CVE_2023_1389_poc

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/timb-machine/linux-malware

- https://github.com/werwolfz/CVE-2023-1389

- https://github.com/zulloper/cve-poc