TP-Link Archer AX-21 Command Injection Vulnerability (CVE-2023-1389)
TP-Link Archer AX-21 contains a command injection vulnerability that allows for remote code execution.
An attacker, without authentication, can achieve full data confidentiality loss, arbitrary modification of data, complete denial of service or system unavailability. Federal agencies are required to remediate by 2023-05-22 under CISA BOD 22-01.
This is a Command Injection (CWE-77) vulnerability in TP-Link Archer AX21. Exploitation requires adjacent_network access, low attack complexity, no authentication required, and no user interaction required.
Probably yes if any of these apply:
Active exploitation documented in the wild. Threat-research write-up: http://packetstormsecurity.com/files/174131/TP-Link-Archer-AX21-Command-Injection.html
Manual remediation steps
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.