Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-1389: Command Injection in TP-Link Archer AX21 (AX1800)

0
High
VulnerabilityCVE-2023-1389cvecve-2023-1389
Published: Wed Mar 15 2023 (03/15/2023, 00:00:00 UTC)
Source: CVE Database V5
Product: TP-Link Archer AX21 (AX1800)

Description

TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.

AI-Powered Analysis

AILast updated: 10/28/2025, 22:10:39 UTC

Technical Analysis

CVE-2023-1389 is a command injection vulnerability identified in the TP-Link Archer AX21 (AX1800) router firmware versions prior to 1.1.4 Build 20230219. The vulnerability resides in the web management interface at the /cgi-bin/luci;stok=/locale endpoint, specifically within the country parameter of the country form used in a write operation. The parameter is not properly sanitized before being passed to the popen() system call, which executes shell commands. This lack of input validation allows an unauthenticated attacker to inject arbitrary shell commands by sending a crafted POST request to the endpoint. Since the commands are executed with root privileges, an attacker can fully compromise the device, leading to complete control over the router. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command). The CVSS v3.1 score of 8.8 reflects the vulnerability's high impact, with no privileges required, no user interaction needed, and the attack vector being adjacent network (AV:A), meaning the attacker must be on the same local network or connected via VPN. While no public exploits have been reported yet, the simplicity of exploitation and the critical level of access gained make this a severe threat. The vulnerability affects all firmware versions before 1.1.4 Build 20230219, and no official patch links were provided in the source data, indicating that users must verify firmware updates directly from TP-Link. The vulnerability's exploitation could lead to full device compromise, enabling attackers to intercept or manipulate network traffic, pivot to internal networks, or launch further attacks.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on TP-Link Archer AX21 routers in their network infrastructure. Successful exploitation can lead to full device compromise, resulting in loss of confidentiality, integrity, and availability of network traffic passing through the router. Attackers could intercept sensitive data, modify routing configurations, or launch man-in-the-middle attacks. This is particularly critical for small and medium enterprises or branch offices that may use consumer-grade routers without rigorous security controls. Additionally, compromised routers can serve as footholds for lateral movement within corporate networks or as platforms for launching attacks against other targets. The vulnerability's requirement for network adjacency means that attackers need to be on the same local network or connected via VPN, which may limit remote exploitation but does not eliminate risk, especially in environments with exposed management interfaces or weak network segmentation. Given the widespread use of TP-Link devices in Europe, the potential impact on operational continuity and data security is considerable.

Mitigation Recommendations

European organizations should immediately verify the firmware version of all TP-Link Archer AX21 routers and upgrade to version 1.1.4 Build 20230219 or later, where the vulnerability is fixed. If immediate firmware upgrade is not possible, disable remote management interfaces and restrict access to the web management interface to trusted internal IP addresses only. Implement network segmentation to isolate router management interfaces from general user networks and untrusted devices. Monitor network traffic for unusual POST requests to the /cgi-bin/luci;stok=/locale endpoint, which could indicate exploitation attempts. Employ intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect command injection patterns targeting this vulnerability. Regularly audit router configurations and logs for unauthorized changes or suspicious activity. Educate IT staff about the risks of using consumer-grade routers in critical network segments and consider deploying enterprise-grade network equipment with robust security controls. Finally, maintain an inventory of all network devices to ensure timely identification and patching of vulnerable equipment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
tenable
Date Reserved
2023-03-14T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9a4247d717aace216a4

Added to database: 10/21/2025, 7:06:12 PM

Last enriched: 10/28/2025, 10:10:39 PM

Last updated: 10/30/2025, 3:48:21 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats