TP-Link Archer AX21 Command Injection (CVE-2023-1389)

high Nessus Plugin ID 177632

Synopsis

The remote host is affected by a command injection vulnerability.

Description

The remote TP-Link Archer AX21 device is vulnerable to a command injection vulnerability. An unauthenticated network-adjacent attacker could leverage this vulnerability, via a specially crafted message, to execute arbitrary code as root on the device.

Solution

Update firmware in accordance with vendor advisory.

See Also

https://www.tp-link.com/us/support/faq/3643/

http://www.nessus.org/u?105e68d8

Plugin Details

Severity: High

ID: 177632

File Name: tplink_archer_ax21_cve-2023-1389.nbin

Version: 1.11

Type: remote

Family: CGI abuses

Published: 6/26/2023

Updated: 4/23/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: High

Base Score: 8.3

Temporal Score: 6.9

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-1389

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/h:tp-link:archer_ax21

Required KB Items: installed_sw/TP-Link Web UI

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 3/14/2023

Vulnerability Publication Date: 3/14/2023

CISA Known Exploited Vulnerability Due Dates: 5/22/2023

Reference Information

CVE: CVE-2023-1389