CVE-2023-33538

8.8 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in specific TP-Link router models that allows authenticated attackers to execute arbitrary commands on the device. The vulnerability exists in the /userRpm/WlanNetworkRpm component and affects users of TP-Link TL-WR940N, TL-WR841N, and TL-WR740N routers in specific hardware versions.

💻 Affected Systems

Products:
  • TP-Link TL-WR940N
  • TP-Link TL-WR841N
  • TP-Link TL-WR740N
Versions: TL-WR940N V2/V4, TL-WR841N V8/V10, TL-WR740N V1/V2
Operating Systems: Embedded Linux firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authentication to exploit, but default credentials may be used if not changed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to install persistent backdoors, intercept network traffic, pivot to internal networks, or brick the device.

🟠

Likely Case

Router takeover enabling traffic monitoring, DNS hijacking, credential theft, and lateral movement to connected devices.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

CISA has warned about active exploitation in the wild. Exploit requires authentication but default credentials are commonly used.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check TP-Link support for latest firmware

Vendor Advisory: https://www.tp-link.com/us/support/download/

Restart Required: Yes

Instructions:

1. Visit TP-Link support site for your specific model. 2. Download latest firmware. 3. Log into router admin interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevents external exploitation by disabling remote administration access

Change Default Credentials

all

Mitigates exploitation by requiring unique authentication

🧯 If You Can't Patch

  • Segment affected routers on isolated network VLAN
  • Implement strict firewall rules to limit router management interface access

🔍 How to Verify

Check if Vulnerable:

Check router model and hardware version via admin interface or device label. If matches affected models/versions and firmware is outdated, assume vulnerable.

Check Version:

Log into router admin interface and check System Tools > Firmware Upgrade page

Verify Fix Applied:

Verify firmware version after update matches latest available from TP-Link support site.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /userRpm/WlanNetworkRpm
  • Multiple failed login attempts followed by successful login
  • Commands containing shell metacharacters in URL parameters

Network Indicators:

  • Unusual outbound connections from router
  • DNS queries to suspicious domains from router
  • Unexpected SSH/Telnet connections to router

SIEM Query:

source="router_logs" AND (uri="/userRpm/WlanNetworkRpm" AND (param="*;*" OR param="*|*" OR param="*`*"))

🔗 References

📤 Share & Export