TP-Link Archer AX21 - RCE (CVE-2023-1389)
1877Exploiting IPs reported
TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.
CrowdSec analysis
CVE-2023-1389 is a command injection vulnerability found in the web management interface of certain TP-Link Archer devices, allowing unauthenticated attackers to execute commands with root privileges via unsanitized input.
CrowdSec has been tracking this vulnerability and its exploits since 15th of December 2023.
CrowdSec network data shows that most actors exploiting CVE-2023-1389 rely on broad, untargeted scans with minimal filtering. The activity is largely automated and opportunistic in nature. Additionally, according to week-over-week analysis by CrowdSec, exploitation of CVE-2023-1389 is surging. Attack volumes are spiking well above historical norms, indicating widespread and escalating interest from threat actors. CVE-2023-1389 is currently experiencing high visibility and active exploitation across the internet.
Observed exploitation attempts focus on URLs containing the /cgi-bin/luci/;stok=/locale
path.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.