2 results (0.002 seconds)

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

TP-Link Archer AX21(US)_V3_1.1.4 Build 20230219 and AX21(US)_V3.6_1.1.4 Build 20230219 are vulnerable to Buffer Overflow. TP-Link Archer AX21(US)_V3_1.1.4 Build 20230219 y AX21(US)_V3.6_1.1.4 Build 20230219 son vulnerables a un desbordamiento de búfer. • https://github.com/xiaobye-ctf/My-CVE/tree/main/TP-Link/CVE-2023-31710 • CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 5%CPEs: 2EXPL: 5

TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Archer AX21 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the merge_country_config function. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. • https://www.exploit-db.com/exploits/51677 https://github.com/Terminal1337/CVE-2023-1389 https://github.com/Voyag3r-Security/CVE-2023-1389 http://packetstormsecurity.com/files/174131/TP-Link-Archer-AX21-Command-Injection.html https://www.tenable.com/security/research/tra-2023-11 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •