HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🟠 High🛡️ Vulnerability

Active Exploitation Attempts on High‑Severity TP‑Link Router Command Injection (CVE‑2023‑33538) Remain Unsuccessful

A command‑injection flaw (CVE‑2023‑33538) affecting several legacy TP‑Link routers is being probed by threat actors for over a year. Although proof‑of‑concept code and bot‑like traffic have been observed, no successful compromise has been verified, leaving organizations with a lingering supply‑chain risk.

🛡️ LiveThreat™ Intelligence · 📅 April 21, 2026· 📰 securityaffairs.com
🟠
Severity
High
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
5 recommended
📰
Source
securityaffairs.com

Critical Command Injection in TP‑Link Routers (CVE‑2023‑33538) Under Active Attack but No Confirmed Exploits

What It Is – CVE‑2023‑33538 is a command‑injection flaw in the /userRpm/WlanNetworkRpm component of several legacy TP‑Link Wi‑Fi routers (WR940N v2/v4, WR740N v1/v2, WR841N v8/v10). The vulnerability (CVSS 8.8) allows an unauthenticated attacker to inject arbitrary OS commands via the ssid1 HTTP parameter.

Exploitability – Proof‑of‑concept exploits have been publicly released and telemetry from Palo Alto Networks shows large‑scale exploitation attempts since the vulnerability entered the CISA KEV catalog (June 2025). Despite repeated attempts, no successful compromise of the devices has been verified to date.

Affected Products – TP‑Link router models: TL‑WR940N v2/v4, TL‑WR740N v1/v2, TL‑WR841N v8/v10 (all end‑of‑life firmware).

TPRM Impact

  • Legacy routers are often deployed in corporate branch offices, retail sites, and IoT edge nodes, creating a potential supply‑chain foothold.
  • Successful exploitation could enlist devices into Mirai‑style botnets, enabling DDoS attacks or lateral movement toward critical business systems.

Recommended Actions

  • Verify firmware version on all TP‑Link routers; apply the latest security patches or replace devices with supported models.
  • Immediately disable default credentials (admin:admin) and enforce strong, unique passwords.
  • Segment IoT/branch‑office networks from core corporate assets; enforce strict firewall rules on the /userRpm/WlanNetworkRpm endpoint.
  • Deploy IDS/IPS signatures that detect the characteristic GET requests and the arm7 ELF payload.
  • Conduct an inventory audit to ensure no unsupported TP‑Link hardware remains in the environment.

Source: Security Affairs – CVE‑2023‑33538 under attack for a year, but exploitation still unsuccessful

📰 Original Source
https://securityaffairs.com/191040/hacking/cve-2023-33538-under-attack-for-a-year-but-exploitation-still-unsuccessful.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.