Command Injection Vulnerability in TP-Link Routers
CVE-2023-33538

8.8HIGH

Key Information:

Vendor

Tp-link

Vendor
CVE Published:
7 June 2023

Badges

🔥 Trending now📈 Trended📈 Score: 1,710💰 Ransomware👾 Exploit Exists🟣 EPSS 89%🦅 CISA Reported📰 News Worthy

What is CVE-2023-33538?

CVE-2023-33538 is a command injection vulnerability identified in specific models of TP-Link routers, namely the TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2. These devices are widely used for home and small office networking, providing essential connectivity functions such as wireless networking and internet sharing. The vulnerability arises from the insecure handling of inputs in the component responsible for WLAN settings management, specifically the /userRpm/WlanNetworkRpm interface. Exploitation of this vulnerability could allow attackers to execute arbitrary commands on the router, leading to unauthorized access and control over the devices, which could disrupt network services and compromise connected systems.

Potential Impact of CVE-2023-33538

  1. Unauthorized Access and Control: Attackers exploiting this vulnerability could gain full control over the affected routers, allowing them to modify configurations, eavesdrop on network traffic, and potentially pivot to other devices on the network.

  2. Network Disruption: The ability to execute arbitrary commands may enable attackers to disrupt normal operations of the router, leading to loss of connectivity for users and devices reliant on the compromised equipment.

  3. Propagation of Threats: A compromised router can serve as a launch point for further attacks, enabling the distribution of malware or facilitating unauthorized access to sensitive information within a local network, thereby increasing the broader risk of data breaches.

CISA has reported CVE-2023-33538

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2023-33538 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.

The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

News Articles

CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA

CISA has added two new vulnerabilities to its KEV Catalog, based on evidence of active exploitation

2 days ago

TP-Link Router Flaw CVE-2023-33538 Under Active Exploit, CISA Issues Immediate Alert

TP-Link and Zyxel router flaws are under active attack, affecting global users and federal systems. Urgent updates needed.

4 days ago

FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications

We analyze FrostyGoop malware, which targets OT systems. This article walks through newly discovered samples, indicators, and also examines configurations and network communications. We analyze FrostyGoop malware, which targets OT systems. This article walks through newly discovered samples, indicat...

References

EPSS Score

89% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 📈

    Vulnerability started trending

  • 💰

    Used in Ransomware

  • 👾

    Exploit known to exist

  • 🦅

    CISA Reported

  • 📰

    First article discovered by Unit 42

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-33538 : Command Injection Vulnerability in TP-Link Routers