CVE-2023-27359

TP-Link AX1800 hotplugd Firewall Rule Race Condition Vulnerability. This vulnerability allows remote attackers to gain access to LAN-side services on affected installations of TP-Link Archer AX21 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the hotplugd daemon. The issue results from firewall rule handling that allows an attacker access to resources that should be available to the LAN interface only. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the root user. . Was ZDI-CAN-19664.
Configurations

No configuration.

History

21 Nov 2024, 07:52

Type Values Removed Values Added
References () https://www.zerodayinitiative.com/advisories/ZDI-23-452/ - () https://www.zerodayinitiative.com/advisories/ZDI-23-452/ -

18 Sep 2024, 19:15

Type Values Removed Values Added
Summary
  • (es) Vulnerabilidad de condición de ejecución de regla de firewall hotplugd de TP-Link AX1800. Esta vulnerabilidad permite a atacantes remotos obtener acceso a servicios del lado LAN en instalaciones afectadas de enrutadores TP-Link Archer AX21. No se requiere autenticación para aprovechar esta vulnerabilidad. La falla específica existe dentro del demonio hotplugd. El problema se debe al manejo de las reglas del firewall que permiten que un atacante acceda a recursos que deberían estar disponibles únicamente para la interfaz LAN. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar código arbitrario en el contexto del usuario root. Era ZDI-CAN-19664.
Summary (en) TP-Link AX1800 hotplugd Firewall Rule Race Condition Vulnerability. This vulnerability allows remote attackers to gain access to LAN-side services on affected installations of TP-Link Archer AX21 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the hotplugd daemon. The issue results from firewall rule handling that allows an attacker access to resources that should be available to the LAN interface only. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the root user. Was ZDI-CAN-19664. (en) TP-Link AX1800 hotplugd Firewall Rule Race Condition Vulnerability. This vulnerability allows remote attackers to gain access to LAN-side services on affected installations of TP-Link Archer AX21 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the hotplugd daemon. The issue results from firewall rule handling that allows an attacker access to resources that should be available to the LAN interface only. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the root user. . Was ZDI-CAN-19664.

03 May 2024, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-03 02:15

Updated : 2024-11-21 07:52


NVD link : CVE-2023-27359

Mitre link : CVE-2023-27359

CVE.ORG link : CVE-2023-27359


JSON object : View

Products Affected

No product.

CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')