CVE-2023-28760

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers on the local network to execute arbitrary code as root on TP-Link AX1800 routers. Attackers can exploit a stack-based buffer overflow in the minidlna service when a USB drive is connected. Only users with the affected router model and USB storage attached are vulnerable.

💻 Affected Systems

Products:
  • TP-Link Archer AX21 WiFi 6 Router
Versions: All versions prior to patched firmware
Operating Systems: Embedded Linux (TP-Link firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires USB flash drive connected to router and minidlna service running (typically enabled by default with USB storage).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router compromise allowing attackers to intercept all network traffic, install persistent malware, pivot to other devices, and permanently brick the device.

🟠

Likely Case

Router takeover enabling traffic monitoring, credential theft, DNS hijacking, and access to connected USB storage data.

🟢

If Mitigated

Limited impact if USB storage is disconnected or attacker lacks LAN access, though router remains vulnerable to local network threats.

🌐 Internet-Facing: LOW - Exploitation requires LAN access; the vulnerability is not directly reachable from the internet.
🏢 Internal Only: HIGH - Any compromised device or malicious actor on the local network can exploit this without authentication.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code exists; exploitation is straightforward for attackers with LAN access when USB storage is present.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check TP-Link firmware updates for Archer AX21

Vendor Advisory: https://www.tp-link.com/us/support/download/archer-ax21/

Restart Required: Yes

Instructions:

1. Log into router admin interface (192.168.0.1). 2. Navigate to System Tools > Firmware Upgrade. 3. Check for updates and install latest firmware. 4. Reboot router after installation.

🔧 Temporary Workarounds

Disable USB Storage

all

Remove USB flash drives from router to eliminate attack vector

Physically disconnect USB storage devices

Disable Media Server

all

Turn off minidlna/UPnP media sharing service

Router admin: Advanced > USB Sharing > Media Server > Disable

🧯 If You Can't Patch

  • Segment network to isolate router from untrusted devices
  • Implement strict network access controls and monitor for suspicious LAN activity

🔍 How to Verify

Check if Vulnerable:

Check if USB storage is connected and minidlna service is running on Archer AX21 router

Check Version:

Router admin interface: Status > Firmware Version

Verify Fix Applied:

Verify firmware version is updated and test that exploit no longer works

📡 Detection & Monitoring

Log Indicators:

  • Unusual minidlna process crashes
  • Suspicious network traffic to router on port 8200

Network Indicators:

  • Unexpected connections to router's UPnP service
  • Anomalous outbound traffic from router

SIEM Query:

source="router_logs" AND (process="minidlna" AND event="crash") OR (dest_port=8200 AND suspicious_payload)

🔗 References

📤 Share & Export