Published:2024/01/09  Last Updated:2024/06/27
      
        JVNVU#91401812
        Multiple TP-Link products vulnerable to OS command injection
              
      
      Overview
Multiple products provided by TP-LINK contain OS command injection vulnerabilities.
Products Affected
CVE-2024-21773
- Archer AX3000 firmware versions prior to "Archer AX3000(JP)_V1_1.1.2 Build 20231115"
 - Archer AX5400 firmware versions prior to "Archer AX5400(JP)_V1_1.1.2 Build 20231115"
 - Deco X50 firmware versions prior to "Deco X50(JP)_V1_1.4.1 Build 20231122"
 - Deco XE200 firmware versions prior to "Deco XE200(JP)_V1_1.2.5 Build 20231120"
 - Archer Air R5 firmware versions prior to "Archer Air R5(JP)_V1_1.1.6 Build 20240508"
 
- Archer AX3000 firmware versions prior to "Archer AX3000(JP)_V1_1.1.2 Build 20231115"
 - Archer AX5400 firmware versions prior to "Archer AX5400(JP)_V1_1.1.2 Build 20231115"
 - Archer AXE75 firmware versions prior to "Archer AXE75(JP)_V1_231115"
 - Archer Air R5 firmware versions prior to "Archer Air R5(JP)_V1_1.1.6 Build 20240508"
 
- Archer AX3000 firmware versions prior to "Archer AX3000(JP)_V1_1.1.2 Build 20231115"
 - Archer AX5400 firmware versions prior to "Archer AX5400(JP)_V1_1.1.2 Build 20231115"
 - Archer AXE75 firmware versions prior to "Archer AXE75(JP)_V1_231115"
 - Deco X50 firmware versions prior to "Deco X50(JP)_V1_1.4.1 Build 20231122"
 - Deco XE200 firmware versions prior to "Deco XE200(JP)_V1_1.2.5 Build 20231120"
 
Description
Multiple products provided by TP-LINK contain multiple vulnerabilities listed below.
- OS command injection (CWE-78) - CVE-2024-21773
	
CVSS v3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score: 7.5  - OS command injection (CWE-78) - CVE-2024-21821
	
CVSS v3 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Base Score: 7.1  - OS command injection (CWE-78) - CVE-2024-21833
	
CVSS v3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score: 7.5  
Impact
- A unauthenticated user who can access the affected device from the LAN port or Wi-Fi may execute an arbitrary OS command on the device that has pre-specified target devices and blocked URLs in parental control settings - CVE-2024-21773
 - A unauthenticated user who can access the affected device from the LAN port or Wi-Fi may execute an arbitrary OS command on the device - CVE-2024-21833
 - A user who logs in to the affected device may execute an arbitrary OS command (The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi) - CVE-2024-21821
 
Solution
Update the Firmware
Update the firmware to the latest version according to the information provided by the developer.
Vendor Status
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
Other Information
| JPCERT Alert | 
                                     | 
              
| JPCERT Reports | 
                                     | 
              
| CERT Advisory | 
                                     | 
              
| CPNI Advisory | 
                                     | 
              
| TRnotes | 
                                     | 
              
| CVE | 
                                    CVE-2024-21773 | 
              
| 
                                    CVE-2024-21821 | 
              |
| 
                                    CVE-2024-21833 | 
              |
| JVN iPedia | 
                                     | 
              
Update History
- 2024/06/27
 - Information under the section [Products Affected], [Impact] and [Vendor Status] was updated