Tagvent 2023

The Eleventh Day Of Tagsmas (2023): A Critical Vulnerability in TP-Link Routers (CVE-2023-1389)

CVE
CVE-2023-1389
In CISA Kev
Vulnerability
Command Injection
Description
TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.
Tags

Discovery and Initial Impact

Multiple security research teams discovered CVE-2023-1389 while preparing for the Pwn2Own hacking competition in Toronto, which was held in early 2023. The vulnerability is caused by inadequate input sanitization in the /cgi-bin/luci endpoint, which manages locale settings. An attacker who is not authenticated can exploit this vulnerability to execute remote code on impacted routers.

Due to the widespread use of TP-Link routers in homes and businesses globally, CVE-2023-1389 posed a major threat. While exploitation attempts were not immediately observed, the high accessibility of vulnerable devices made large-scale attacks feasible. The vulnerability received a CVSS v3 base score of 9.8 out of 10, reflecting its critical severity.

Exploitation and Long-Term Impacts

Exploitation attempts targeting CVE-2023-1389 began shortly after TP-Link released firmware patches in February 2023. Various malicious actors, including botnet operators, quickly incorporated the vulnerability into their arsenal.

By April 2023, the infamous Mirai IoT botnet had added modules to spread via CVE-2023-1389. Over the next few months, newer botnets like Condi also started leveraging the vulnerability. These botnets can leverage compromised routers to conduct DDoS attacks, mine cryptocurrency, and more. So, while TP-Link addressed the vulnerability, the integration into attacker toolkits means it can still serve as an infection vector. 

Why Defenders Should Still Be Concerned

Several TP-Link routers are vulnerable and still not updated, exposing them to compromise. Plus, sophisticated botnets have now integrated exploitation capabilities into their codebase, which means that outdated devices can be compromised for expanding botnets. And, as can be seen in the GreyNoise activity graph, attackers have been focusing more intently on this vulnerability towards the latter half of 2023.

Months after disclosure, CVE-2023-1389 remains an active threat for unpatched devices. Defenders should pay specific attention to any exploitation attempts that target CVE-2023-1389 and monitor their network accordingly. Implementing firewall rules can also help mitigate attacks against any lingering vulnerable devices. 

Related Links

< Back to Tagvent Calendar