TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.

Project Subscriptions

Vendors Products
Tp-link Subscribe
Archer Ax21 Subscribe
Archer Ax21 Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 00:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Tue, 28 Jan 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2023-05-01'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: tenable

Published:

Updated: 2025-10-21T23:15:23.352Z

Reserved: 2023-03-14T00:00:00.000Z

Link: CVE-2023-1389

cve-icon Vulnrichment

Updated: 2024-08-02T05:49:11.331Z

cve-icon NVD

Status : Analyzed

Published: 2023-03-15T23:15:09.403

Modified: 2025-11-03T18:58:55.867

Link: CVE-2023-1389

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses