Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-28760: n/a

0
High
VulnerabilityCVE-2023-28760cvecve-2023-28760
Published: Thu Oct 02 2025 (10/02/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

TP-Link AX1800 WiFi 6 Router (Archer AX21) devices allow unauthenticated attackers (on the LAN) to execute arbitrary code as root via the db_dir field to minidlnad. The attacker obtains the ability to modify files.db, and that can be used to reach a stack-based buffer overflow in minidlna-1.1.2/upnpsoap.c. Exploitation requires that a USB flash drive is connected to the router (customers often do this to make a \\192.168.0.1 share available on their local network).

AI-Powered Analysis

AILast updated: 10/04/2025, 10:45:51 UTC

Technical Analysis

CVE-2023-28760 is a high-severity vulnerability affecting TP-Link AX1800 WiFi 6 Router (Archer AX21) devices. The vulnerability allows unauthenticated attackers on the local area network (LAN) to execute arbitrary code with root privileges by exploiting a stack-based buffer overflow in the minidlnad service. Specifically, the attack vector involves manipulating the db_dir field used by minidlnad, a component responsible for media server functionality via the MiniDLNA implementation version 1.1.2. The attacker can modify the files.db database, which is leveraged to trigger the buffer overflow in the upnpsoap.c source file of minidlnad. A prerequisite for exploitation is that a USB flash drive must be connected to the router, a common scenario as users often connect USB drives to enable network shares (e.g., \\192.168.0.1). The vulnerability does not require authentication or user interaction but does require local network access and the presence of the USB device. The CVSS v3.1 base score is 7.5, reflecting high impact on confidentiality, integrity, and availability, with attack vector being adjacent network and high attack complexity. No known exploits are currently reported in the wild, and no patches have been linked yet. The underlying weakness is a classic stack-based buffer overflow (CWE-121), which can lead to full system compromise due to root-level code execution on the router firmware.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially in environments where TP-Link Archer AX21 routers are deployed, such as small and medium enterprises or home office setups. Successful exploitation could allow attackers to gain persistent root access to the router, enabling interception and manipulation of network traffic, deployment of malware, lateral movement within the network, and disruption of network availability. This could lead to data breaches involving sensitive corporate or personal information, compromise of internal systems, and potential use of the router as a foothold for further attacks. The requirement for LAN access limits remote exploitation but insider threats or compromised devices within the network could trigger attacks. The common practice of connecting USB drives to routers for file sharing increases the attack surface. Given the router’s role as a network gateway, compromise could severely impact network integrity and confidentiality, making this a critical concern for European organizations prioritizing data protection and network security compliance under regulations like GDPR.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first identify all TP-Link Archer AX21 routers within their network and assess if USB storage devices are connected. Immediate mitigation steps include disconnecting USB drives from affected routers to eliminate the exploitation vector. Network segmentation should be enforced to restrict access to router management interfaces and LAN segments where vulnerable devices reside, limiting attacker access. Monitoring network traffic for unusual activity related to minidlnad or UPnP services can help detect exploitation attempts. Organizations should apply firmware updates from TP-Link as soon as they become available, even though no patches are currently linked, and maintain close communication with vendor advisories. If firmware updates are delayed, consider disabling the media server or UPnP services on the router to reduce attack surface. Additionally, implement strong network access controls and device authentication to prevent unauthorized LAN access. Regularly auditing router configurations and connected devices will help maintain security posture against such vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-03-23T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e0f3bfb66c7f7acdd3cc02

Added to database: 10/4/2025, 10:15:27 AM

Last enriched: 10/4/2025, 10:45:51 AM

Last updated: 10/7/2025, 1:15:26 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats