TP-Link AX1800 hotplugd Firewall Rule Race Condition Vulnerability. This vulnerability allows remote attackers to gain access to LAN-side services on affected installations of TP-Link Archer AX21 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the hotplugd daemon. The issue results from firewall rule handling that allows an attacker access to resources that should be available to the LAN interface only. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the root user. . Was ZDI-CAN-19664.
History

Wed, 25 Sep 2024 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link archer Ax21 Firmware
CPEs cpe:2.3:a:tp-link:ax1800:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_ax21_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tp-link ax1800
Tp-link archer Ax21 Firmware

Wed, 18 Sep 2024 18:45:00 +0000

Type Values Removed Values Added
Description TP-Link AX1800 hotplugd Firewall Rule Race Condition Vulnerability. This vulnerability allows remote attackers to gain access to LAN-side services on affected installations of TP-Link Archer AX21 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the hotplugd daemon. The issue results from firewall rule handling that allows an attacker access to resources that should be available to the LAN interface only. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the root user. Was ZDI-CAN-19664. TP-Link AX1800 hotplugd Firewall Rule Race Condition Vulnerability. This vulnerability allows remote attackers to gain access to LAN-side services on affected installations of TP-Link Archer AX21 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the hotplugd daemon. The issue results from firewall rule handling that allows an attacker access to resources that should be available to the LAN interface only. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the root user. . Was ZDI-CAN-19664.

cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published: 2024-05-03T01:56:11.459Z

Updated: 2024-09-25T21:01:21.155Z

Reserved: 2023-02-28T17:58:45.482Z

Link: CVE-2023-27359

cve-icon Vulnrichment

Updated: 2024-08-02T12:09:43.401Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-03T02:15:13.833

Modified: 2024-11-21T07:52:44.960

Link: CVE-2023-27359

cve-icon Redhat

No data.