Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-33538: n/a

0
High
VulnerabilityCVE-2023-33538cvecve-2023-33538
Published: Wed Jun 07 2023 (06/07/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm .

AI-Powered Analysis

AILast updated: 12/26/2025, 16:33:37 UTC

Technical Analysis

CVE-2023-33538 is a command injection vulnerability identified in several TP-Link router models, specifically TL-WR940N versions 2 and 4, TL-WR841N versions 8 and 10, and TL-WR740N versions 1 and 2. The vulnerability resides in the /userRpm/WlanNetworkRpm component of the router’s firmware. Command injection (CWE-77) allows an attacker to inject and execute arbitrary system commands on the device. The CVSS 3.1 base score of 8.8 reflects a high-severity issue with network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means an attacker with some level of authenticated access—likely through a compromised or weak credential—can execute commands that could lead to full device compromise, enabling data exfiltration, network pivoting, or denial of service. No patches or exploits are currently publicly available, but the vulnerability’s presence in widely deployed consumer and small business routers makes it a significant threat. The affected firmware versions are not explicitly listed, suggesting multiple firmware releases may be impacted. The vulnerability was published on June 7, 2023, with the reservation date of May 22, 2023. Given the nature of the vulnerability, attackers could leverage it to gain persistent control over network infrastructure devices, undermining network security and privacy.

Potential Impact

For European organizations, the impact of CVE-2023-33538 could be substantial. Many small and medium enterprises (SMEs), as well as home offices, rely on TP-Link routers for internet connectivity and network management. Exploitation could lead to unauthorized command execution on routers, resulting in interception or manipulation of network traffic, disruption of internet access, or use of compromised devices as footholds for further attacks within corporate networks. Confidential data passing through these routers could be exposed or altered, and attackers could deploy malware or ransomware. Critical infrastructure sectors that use these devices for network connectivity could face operational disruptions. The lack of known public exploits currently limits immediate widespread attacks, but the vulnerability’s high severity and ease of exploitation mean that targeted attacks or automated scanning could emerge rapidly. Organizations without proper network segmentation or strong authentication controls are particularly vulnerable.

Mitigation Recommendations

1. Immediately verify if your organization uses any of the affected TP-Link router models (TL-WR940N V2/V4, TL-WR841N V8/V10, TL-WR740N V1/V2). 2. Check TP-Link’s official support channels for firmware updates addressing CVE-2023-33538 and apply them promptly. 3. If no patch is available, restrict access to the router’s management interface by implementing network segmentation and firewall rules to limit management access to trusted IP addresses only. 4. Enforce strong, unique administrative credentials and disable remote management features unless absolutely necessary. 5. Monitor network traffic for unusual activity indicative of command injection attempts or unauthorized access. 6. Consider replacing affected devices with models that have confirmed security updates if patching is not feasible. 7. Educate IT staff and users about the risks of using default credentials and the importance of timely updates. 8. Employ intrusion detection systems (IDS) tuned to detect exploitation attempts targeting command injection vulnerabilities on network devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-05-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9a9247d717aace21ee2

Added to database: 10/21/2025, 7:06:17 PM

Last enriched: 12/26/2025, 4:33:37 PM

Last updated: 2/7/2026, 4:00:01 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats