Skip to main content

CVE-2024-21773: Information disclosure in TP-Link Archer AX3000

High
VulnerabilityCVE-2024-21773cvecve-2024-21773
Published: Wed Jan 10 2024 (01/10/2024, 23:24:50 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link
Product: Archer AX3000

Description

Multiple TP-LINK products allow a network-adjacent unauthenticated attacker with access to the product from the LAN port or Wi-Fi to execute arbitrary OS commands on the product that has pre-specified target devices and blocked URLs in parental control settings.

AI-Powered Analysis

AILast updated: 07/03/2025, 22:42:49 UTC

Technical Analysis

CVE-2024-21773 is a high-severity vulnerability affecting the TP-Link Archer AX3000 router, specifically firmware versions prior to Archer AX3000(JP)_V1_1.1.2 Build 20231115. This vulnerability allows a network-adjacent, unauthenticated attacker with access to the device via LAN or Wi-Fi to execute arbitrary operating system commands. The exploitation vector involves the parental control feature, which contains pre-specified target devices and blocked URLs. Due to improper input validation or command handling (classified under CWE-78: OS Command Injection), an attacker can inject malicious commands that the router executes with elevated privileges. The vulnerability does not require any authentication or user interaction, making it particularly dangerous. The CVSS 3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as the attacker can fully compromise the device, potentially intercepting, modifying, or disrupting network traffic. Although no known exploits are reported in the wild yet, the ease of exploitation and the critical nature of the flaw make it a significant threat to users of the affected TP-Link routers.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for small and medium enterprises (SMEs) and home office environments that commonly use consumer-grade routers like the TP-Link Archer AX3000. Successful exploitation could lead to full compromise of the router, allowing attackers to intercept sensitive data, manipulate network traffic, or create persistent backdoors within the network infrastructure. This can result in data breaches, disruption of business operations, and lateral movement into internal systems. Given the router's role as a network gateway, the impact extends beyond the device itself, potentially affecting the confidentiality and integrity of all data passing through it. Additionally, the vulnerability could be leveraged to launch further attacks such as man-in-the-middle (MITM) or denial of service (DoS) against critical services. The lack of authentication and user interaction requirements increases the risk, as attackers only need network proximity, which could be achieved via compromised devices or insider threats.

Mitigation Recommendations

European organizations should immediately verify the firmware version of their TP-Link Archer AX3000 devices and upgrade to the fixed version Archer AX3000(JP)_V1_1.1.2 Build 20231115 or later once available. Until a patch is applied, organizations should restrict access to the router's LAN and Wi-Fi networks by implementing strong network segmentation and access controls, limiting device connectivity to trusted users only. Disabling parental control features temporarily can reduce the attack surface. Network monitoring should be enhanced to detect unusual command execution patterns or unexpected network behavior indicative of exploitation attempts. Employing network intrusion detection systems (NIDS) with signatures for command injection attempts targeting TP-Link routers can provide early warnings. Additionally, organizations should consider replacing vulnerable devices with enterprise-grade routers that offer better security controls and regular firmware updates. Finally, educating users about the risks of connecting unknown devices to the network and enforcing strong Wi-Fi security protocols (WPA3 where possible) will help mitigate unauthorized network access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2024-01-04T00:17:51.152Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0a31182aa0cae27f6f33

Added to database: 6/3/2025, 2:44:01 PM

Last enriched: 7/3/2025, 10:42:49 PM

Last updated: 8/12/2025, 4:20:52 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats