Rewterz Threat Alert – North Korean APT Kimsuky Aka Black Banshee – Active IOCs
March 17, 2023Rewterz Threat Alert – Ursnif Banking Trojan aka Gozi – Active IOCs
March 17, 2023Rewterz Threat Alert – North Korean APT Kimsuky Aka Black Banshee – Active IOCs
March 17, 2023Rewterz Threat Alert – Ursnif Banking Trojan aka Gozi – Active IOCs
March 17, 2023Severity
High
Analysis Summary
CVE-2023-27333 CVSS:8.8
TP-Link Archer AX21 routers are vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the command 0x422 provided to the tmpServer service. By sending a specially crafted request, a remote attacker could overflow a buffer and execute arbitrary code in the context of root.
CVE-2023-27332 CVSS:8.8
TP-Link Archer AX21 routers are vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the logging functionality of the tdpServer program. By sending a specially crafted request, a remote attacker could overflow a buffer and execute arbitrary code in the context of root.
Impact
- Buffer Overflow
Indicators Of Compromise
CVE
- CVE-2023-27333
- CVE-2023-27332
Affected Vendors
TP-Link
Affected Products
- TP-Link Archer AX21 3.6_1.1.3 Build 20221125
Remediation
Upgrade to the latest version of Archer AX21, available from the TP-Link Website.