TP-Link.Archer.AX21.Unauthenticated.Command.Injection

description-logoDescription

This indicates an attack attempt to exploit an Unauthenticated Command Injection Vulnerability in TP-Link Archer AX21 (AX1800).
The vulnerability is due to an error in the vulnerable application when handling a maliciously crafted request. An unauthenticated remote attacker may be able to exploit this to execute arbitrary commands within the context of the application.

description-logoOutbreak Alert

TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 contains a command injection vulnerability in the web management interface specifically in the "Country" field. There is no sanitization of this field, so an attacker can exploit it for malicious activities and gain foothold. The vulnerability has been seen to be exploited in the wild to deploy Mirai botnet.

View the full Outbreak Alert Report

affected-products-logoAffected Products

TP-Link Archer AX21 (AX1800) Version 1.1.4 Build 20230219 or prior

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor:
https://www.tp-link.com/us/support/download/archer-ax21/v3/#Firmware

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2024-01-23 26.720 Sig Added
2023-04-03 23.526 Default_action:pass:drop
2023-03-23 23.519