CVE-2023-33538

TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm .
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tl-wr940n_firmware:-:*:*:*:*:*:*:*
OR cpe:2.3:h:tp-link:tl-wr940n:2.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr940n:4.0:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:tp-link:tl-wr841n_firmware:-:*:*:*:*:*:*:*
OR cpe:2.3:h:tp-link:tl-wr841n:8.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr841n:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:tp-link:tl-wr740n_firmware:-:*:*:*:*:*:*:*
OR cpe:2.3:h:tp-link:tl-wr740n:1.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr740n:2.0:*:*:*:*:*:*:*

History

11 Jul 2025, 14:49

Type Values Removed Values Added
References
  • () https://web.archive.org/web/20230609111043/https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/3/TL-WR940N_TL-WR841N_userRpm_WlanNetworkRpm_Command_Injection.md - Exploit, Third Party Advisory
  • () https://www.secpod.com/blog/cisa-issues-warning-on-active-exploitation-of-tp-link-vulnerability-cve-2023-33538/ - Third Party Advisory
  • () https://www.tp-link.com/us/support/faq/3562/ - Product
References () https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/3/TL-WR940N_TL-WR841N_userRpm_WlanNetworkRpm_Command_Injection.md - Exploit, Third Party Advisory () https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/3/TL-WR940N_TL-WR841N_userRpm_WlanNetworkRpm_Command_Injection.md - Broken Link, Exploit, Third Party Advisory

Information

Published : 2023-06-07 04:15

Updated : 2025-07-11 14:49


NVD link : CVE-2023-33538

Mitre link : CVE-2023-33538

CVE.ORG link : CVE-2023-33538


JSON object : View

Products Affected

tp-link

  • tl-wr740n
  • tl-wr740n_firmware
  • tl-wr940n
  • tl-wr841n_firmware
  • tl-wr940n_firmware
  • tl-wr841n
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')