mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
28 lines
1.5 KiB
Markdown
28 lines
1.5 KiB
Markdown
### [CVE-2023-1389](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1389)
|
|
&color=blue)
|
|

|
|

|
|
|
|
### Description
|
|
|
|
TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/174131/TP-Link-Archer-AX21-Command-Injection.html
|
|
- https://www.tenable.com/security/research/tra-2023-11
|
|
|
|
#### Github
|
|
- https://github.com/Co5mos/nuclei-tps
|
|
- https://github.com/DinoBytes/RVASec-2024-Consumer-Routers-Still-Suck
|
|
- https://github.com/Ostorlab/KEV
|
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
|
- https://github.com/Terminal1337/CVE-2023-1389
|
|
- https://github.com/Voyag3r-Security/CVE-2023-1389
|
|
- https://github.com/ahisec/nuclei-tps
|
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
- https://github.com/timb-machine/linux-malware
|
|
|