CVE-2023-28760: n/a
TP-Link AX1800 WiFi 6 Router (Archer AX21) devices allow unauthenticated attackers (on the LAN) to execute arbitrary code as root via the db_dir field to minidlnad. The attacker obtains the ability to modify files.db, and that can be used to reach a stack-based buffer overflow in minidlna-1.1.2/upnpsoap.c. Exploitation requires that a USB flash drive is connected to the router (customers often do this to make a \\192.168.0.1 share available on their local network).
AI Analysis
Technical Summary
CVE-2023-28760 is a high-severity vulnerability affecting TP-Link AX1800 WiFi 6 Router (Archer AX21) devices. The vulnerability allows unauthenticated attackers on the local area network (LAN) to execute arbitrary code with root privileges by exploiting a stack-based buffer overflow in the minidlnad service. Specifically, the attack vector involves manipulating the db_dir field used by minidlnad, a component responsible for media server functionality via the MiniDLNA implementation version 1.1.2. The attacker can modify the files.db database, which is leveraged to trigger the buffer overflow in the upnpsoap.c source file of minidlnad. A prerequisite for exploitation is that a USB flash drive must be connected to the router, a common scenario as users often connect USB drives to enable network shares (e.g., \\192.168.0.1). The vulnerability does not require authentication or user interaction but does require local network access and the presence of the USB device. The CVSS v3.1 base score is 7.5, reflecting high impact on confidentiality, integrity, and availability, with attack vector being adjacent network and high attack complexity. No known exploits are currently reported in the wild, and no patches have been linked yet. The underlying weakness is a classic stack-based buffer overflow (CWE-121), which can lead to full system compromise due to root-level code execution on the router firmware.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially in environments where TP-Link Archer AX21 routers are deployed, such as small and medium enterprises or home office setups. Successful exploitation could allow attackers to gain persistent root access to the router, enabling interception and manipulation of network traffic, deployment of malware, lateral movement within the network, and disruption of network availability. This could lead to data breaches involving sensitive corporate or personal information, compromise of internal systems, and potential use of the router as a foothold for further attacks. The requirement for LAN access limits remote exploitation but insider threats or compromised devices within the network could trigger attacks. The common practice of connecting USB drives to routers for file sharing increases the attack surface. Given the router’s role as a network gateway, compromise could severely impact network integrity and confidentiality, making this a critical concern for European organizations prioritizing data protection and network security compliance under regulations like GDPR.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first identify all TP-Link Archer AX21 routers within their network and assess if USB storage devices are connected. Immediate mitigation steps include disconnecting USB drives from affected routers to eliminate the exploitation vector. Network segmentation should be enforced to restrict access to router management interfaces and LAN segments where vulnerable devices reside, limiting attacker access. Monitoring network traffic for unusual activity related to minidlnad or UPnP services can help detect exploitation attempts. Organizations should apply firmware updates from TP-Link as soon as they become available, even though no patches are currently linked, and maintain close communication with vendor advisories. If firmware updates are delayed, consider disabling the media server or UPnP services on the router to reduce attack surface. Additionally, implement strong network access controls and device authentication to prevent unauthorized LAN access. Regularly auditing router configurations and connected devices will help maintain security posture against such vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2023-28760: n/a
Description
TP-Link AX1800 WiFi 6 Router (Archer AX21) devices allow unauthenticated attackers (on the LAN) to execute arbitrary code as root via the db_dir field to minidlnad. The attacker obtains the ability to modify files.db, and that can be used to reach a stack-based buffer overflow in minidlna-1.1.2/upnpsoap.c. Exploitation requires that a USB flash drive is connected to the router (customers often do this to make a \\192.168.0.1 share available on their local network).
AI-Powered Analysis
Technical Analysis
CVE-2023-28760 is a high-severity vulnerability affecting TP-Link AX1800 WiFi 6 Router (Archer AX21) devices. The vulnerability allows unauthenticated attackers on the local area network (LAN) to execute arbitrary code with root privileges by exploiting a stack-based buffer overflow in the minidlnad service. Specifically, the attack vector involves manipulating the db_dir field used by minidlnad, a component responsible for media server functionality via the MiniDLNA implementation version 1.1.2. The attacker can modify the files.db database, which is leveraged to trigger the buffer overflow in the upnpsoap.c source file of minidlnad. A prerequisite for exploitation is that a USB flash drive must be connected to the router, a common scenario as users often connect USB drives to enable network shares (e.g., \\192.168.0.1). The vulnerability does not require authentication or user interaction but does require local network access and the presence of the USB device. The CVSS v3.1 base score is 7.5, reflecting high impact on confidentiality, integrity, and availability, with attack vector being adjacent network and high attack complexity. No known exploits are currently reported in the wild, and no patches have been linked yet. The underlying weakness is a classic stack-based buffer overflow (CWE-121), which can lead to full system compromise due to root-level code execution on the router firmware.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially in environments where TP-Link Archer AX21 routers are deployed, such as small and medium enterprises or home office setups. Successful exploitation could allow attackers to gain persistent root access to the router, enabling interception and manipulation of network traffic, deployment of malware, lateral movement within the network, and disruption of network availability. This could lead to data breaches involving sensitive corporate or personal information, compromise of internal systems, and potential use of the router as a foothold for further attacks. The requirement for LAN access limits remote exploitation but insider threats or compromised devices within the network could trigger attacks. The common practice of connecting USB drives to routers for file sharing increases the attack surface. Given the router’s role as a network gateway, compromise could severely impact network integrity and confidentiality, making this a critical concern for European organizations prioritizing data protection and network security compliance under regulations like GDPR.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first identify all TP-Link Archer AX21 routers within their network and assess if USB storage devices are connected. Immediate mitigation steps include disconnecting USB drives from affected routers to eliminate the exploitation vector. Network segmentation should be enforced to restrict access to router management interfaces and LAN segments where vulnerable devices reside, limiting attacker access. Monitoring network traffic for unusual activity related to minidlnad or UPnP services can help detect exploitation attempts. Organizations should apply firmware updates from TP-Link as soon as they become available, even though no patches are currently linked, and maintain close communication with vendor advisories. If firmware updates are delayed, consider disabling the media server or UPnP services on the router to reduce attack surface. Additionally, implement strong network access controls and device authentication to prevent unauthorized LAN access. Regularly auditing router configurations and connected devices will help maintain security posture against such vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-03-23T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e0f3bfb66c7f7acdd3cc02
Added to database: 10/4/2025, 10:15:27 AM
Last enriched: 10/4/2025, 10:45:51 AM
Last updated: 10/7/2025, 1:15:26 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40886: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
HighCVE-2025-40885: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.