CVE-2024-21773

8.8 HIGH

📋 TL;DR

This vulnerability allows a network-adjacent attacker on the same LAN or Wi-Fi network to execute arbitrary operating system commands on affected TP-LINK routers. Attackers can exploit this without authentication by targeting devices with parental control settings configured. This affects multiple TP-LINK router models running vulnerable firmware versions.

💻 Affected Systems

Products:
  • TP-LINK Archer Air R5
  • TP-LINK Archer AX3000
  • TP-LINK Archer AX5400
  • TP-LINK Deco X50
Versions: Specific vulnerable firmware versions not specified in references, but multiple models confirmed affected
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires parental control settings to be configured with blocked URLs or target devices, but default configurations may include these settings.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing attackers to intercept all network traffic, install persistent malware, pivot to other devices on the network, or disable network connectivity entirely.

🟠

Likely Case

Attacker gains control of the router to monitor network traffic, redirect DNS, or use the device as part of a botnet.

🟢

If Mitigated

Limited impact if the router is isolated from sensitive internal networks and regularly monitored for suspicious activity.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network adjacency (LAN or Wi-Fi access) but no authentication. The vulnerability is in how parental control settings handle input validation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor firmware updates for each model

Vendor Advisory: https://jvn.jp/en/vu/JVNVU91401812/

Restart Required: Yes

Instructions:

1. Identify your TP-LINK router model. 2. Visit the TP-LINK support page for your model. 3. Download the latest firmware version. 4. Log into router admin interface. 5. Navigate to System Tools > Firmware Upgrade. 6. Upload and install the new firmware. 7. Reboot the router.

🔧 Temporary Workarounds

Disable Parental Controls

all

Temporarily disable parental control features until patching is complete

Network Segmentation

all

Isolate vulnerable routers from sensitive network segments

🧯 If You Can't Patch

  • Replace affected routers with patched models or different vendors
  • Implement strict network access controls to limit LAN/Wi-Fi access to trusted devices only

🔍 How to Verify

Check if Vulnerable:

Check router model and firmware version against TP-LINK's affected products list. If using affected models with parental controls enabled, assume vulnerable.

Check Version:

Log into router web interface and check System Status or Firmware Version page

Verify Fix Applied:

After updating firmware, verify the version matches or exceeds the patched version listed on TP-LINK's support site.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in router logs
  • Parental control configuration changes from unknown sources
  • Multiple failed authentication attempts followed by configuration changes

Network Indicators:

  • Unexpected outbound connections from router
  • DNS redirection or MITM patterns
  • Unusual traffic patterns from router to external IPs

SIEM Query:

source="router_logs" AND (event="command_execution" OR event="config_change") AND user="unauthenticated"

🔗 References

📤 Share & Export