Логотип exploitDog
bind:CVE-2023-1389
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-1389

Количество 3

Количество 3

nvd логотип

CVE-2023-1389

почти 3 года назад

TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.

CVSS3: 8.8
EPSS: Критический
github логотип

GHSA-h49r-m2rg-6pgf

почти 3 года назад

TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.

CVSS3: 8.8
EPSS: Критический
fstec логотип

BDU:2023-01736

почти 3 года назад

Уязвимость веб-интерфейса управления маршрутизаторов TP-Link Archer AX21 (AX1800), позволяющая нарушителю выполнять произвольные команды с привилегиями root

CVSS3: 8.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-1389

TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.

CVSS3: 8.8
94%
Критический
почти 3 года назад
github логотип
GHSA-h49r-m2rg-6pgf

TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.

CVSS3: 8.8
94%
Критический
почти 3 года назад
fstec логотип
BDU:2023-01736

Уязвимость веб-интерфейса управления маршрутизаторов TP-Link Archer AX21 (AX1800), позволяющая нарушителю выполнять произвольные команды с привилегиями root

CVSS3: 8.8
94%
Критический
почти 3 года назад

Уязвимостей на страницу