Description
TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.
Published: 2023-03-15
Score: 8.8 High
EPSS: 93.5% High
KEV: Yes
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Oct 2025 00:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Tue, 28 Jan 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2023-05-01'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Tp-link Archer Ax21 Archer Ax21 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: tenable

Published:

Updated: 2025-10-21T23:15:23.352Z

Reserved: 2023-03-14T00:00:00.000Z

Link: CVE-2023-1389

cve-icon Vulnrichment

Updated: 2024-08-02T05:49:11.331Z

cve-icon NVD

Status : Analyzed

Published: 2023-03-15T23:15:09.403

Modified: 2025-11-03T18:58:55.867

Link: CVE-2023-1389

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses