CVE-2023-33538 under attack for a year, but exploitation still unsuccessful


CVE-2023-33538 under attack for a year, but exploitation still unsuccessful

Pierluigi Paganini
April 20, 2026

Hackers have targeted CVE-2023-33538 flaw in old TP-Link routers for a year, but no successful exploitation has been seen so far.

Hackers have been trying for over a year to exploit a serious flaw, tracked as CVE-2023-33538 (CVSS score of 8.8), in outdated TP-Link routers, but so far without success.

The vulnerability is a command injection vulnerability in the /userRpm/WlanNetworkRpm component that impacts several TP-Link router models (TL-TL-WR940N v2 and v4, TL-WR740N v1 and v2, and TL-WR841N v8 and v10 router models).

CISA added the issue to the KeV catalog in June 2025 and ordered federal agencies to fix the vulnerabilities by July 7, 2025.

CVE-2023-33538, disclosed in June 2023, lies in the /userRpm/WlanNetworkRpm endpoint, where the ssid1 parameter is not properly sanitized. Attackers can exploit this via crafted HTTP requests to inject commands and potentially execute arbitrary code on the device. Proof-of-concept exploits were briefly shared online and remain accessible through web archives.

“Our telemetry systems detected active, large-scale exploitation attempts for CVE-2023-33538 around the time of the addition to the KEV catalog in June 2025.” reads the advisory published by Palo Alto Networks. “We observed multiple exploitation attempts”

The researchers observed attackers sending HTTP GET requests to the /userRpm/WlanNetworkRpm.htm endpoint, trying to abuse the ssid parameter to run multiple commands. They first downloaded a malicious ELF binary named arm7 from a remote server into /tmp, then changed its permissions to make it executable, and finally ran it with a specific argument.

The activity resembles botnet behavior, often linked to Mirai-like malware. The requests also used Basic Authentication with the default credentials admin:admin, encoded in Base64.

“The arm7 binary found in our telemetry appears to be a Mirai variant. It is similar to the one used in the Condi IoT botnet, with multiple examples of the string condi in the file’s code.” continues the report.

The arm7 bot binary connects to its C2 server and listens for commands sent through a network socket. It stores incoming data in a buffer and checks it for specific byte patterns that act as instructions.

Each pattern triggers a different action. The malware can reply with a status message, start or stop operations, activate a lockdown mode, or launch an embedded HTTP server. It can also download updated malware versions depending on the command received.

When an update is triggered, the binary calls an internal update function that removes old files, contacts a hard-coded C2 server (51.38.137[.]113), and downloads fresh binaries for multiple CPU architectures. The malware cycles through several variants to stay compatible with different devices.

The C2 infrastructure is tied to a known malicious host also linked to Mirai-like botnet activity.

If instructed, the malware turns the infected device into a web server. It randomly selects a port, starts an HTTP service, and listens for connections. In this mode, it can distribute malware binaries to other infected devices, helping the botnet spread.

Overall, arm7 acts both as a command-driven bot and a distribution node, constantly updating itself and helping propagate the malware across new systems.

Palo Alto Networks published a detailed analysis of the exploit for CVE-2023-33538 on a TP-Link router to better understand the reason for the failure.

The vulnerability sits in the router’s web interface, specifically in how it handles the ssid1 parameter from the /userRpm/WlanNetworkRpm.htm endpoint. When the system processes this input, it does not clean or validate it properly. That mistake allows an attacker to inject system commands that later get passed to a shell and executed.

The execution flow is long but simple in idea. The router takes the HTTP request, extracts the SSID value, stores it in configuration structures, and compares it with previous settings. When it detects changes, it builds a system command like iwconfig and inserts the SSID value directly into it. The system then runs this command through a shell, which opens the door for code execution.

The experts reproduced the issue by emulating the firmware and logging into the router’s admin panel. They also found that the device requires authentication, so attackers cannot exploit it without valid credentials. The system uses default or weak login setups in many cases, which increases the risk.

Palo Alto Networks also saw important limitations in the environment. The router runs a restricted BusyBox shell with very few tools, so attackers cannot easily download or run advanced utilities. This limits the impact of the exploit in practice.

In summary, the vulnerability is real and allows command injection through ssid1, but successful attacks depend on authentication and the very limited system environment.

“Neither the public PoC for CVE-2023-33538 nor the attack attempts observed in our telemetry would successfully compromise the TP-Link router environment we analyzed. However, our deep dive into the firmware and its emulation reveals a significant gap between the theoretical vulnerability and its practical, real-world application.” concludes the report.

“The attacks seen in the wild were flawed on multiple levels:

  • They were unauthenticated
  • They targeted the incorrect parameter (ssid instead of ssid1)
  • They relied on the wget utility, which is not present in the firmware’s limited BusyBox environment

This demonstrates a common attack pattern of scanning and probing with incomplete or inaccurate exploit code, resulting in noisy but ultimately ineffective attacks.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, TP-Link)







Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Disney+ is embracing the Dark Side, as Star Wars: Maul – Shadow Lord is about to emerge on the service. Before The Mandalorian brought Star Wars into live-action television, the franchise was thriving in animated form, thanks to the initial success of Star Wars: The Clone Wars. Among the many new twists that the series introduced, one of the most notable developments was the return of Darth Maul after his apparent death in Star Wars: The Phantom Menace.

Now, after several series that have developed the character from a terrifying figure to a tragic Sisyphean antagonist, Maul – Shadow Lord will throw the character into a fight against the tyranny of the Empire, leading to tense chases and surprise alliances:

What is Star Wars: Maul – Shadow Lord?

The former Sith Lord returns

Star Wars: Maul – Shadow Lord is set on the newly introduced world of Janix, a planet on the Mid Rim of the galaxy far, far away that has been unbothered by the still young Galactic Empire in the wake of the Clone Wars. While the planet’s Tactical Defense Force keeps the population in check, the planet has become host to individuals looking to avoid Imperial interests, either out of fear for their lives or to rebuild in the shadows.

Following his usurping of Mandalore and escape from Republic custody in The Clone Wars season 7, Maul is attempting to rebuild the Shadow Collective crime syndicate with what remains of his forces, including fellow Dathomirian Zabraks and Mandalorian supercommandos. As Maul’s operations become too much for the TDF to handle, the Empire establishes a foothold on Janix. While grappling with Stormtroopers and Inquisitors, Maul must make an uneasy alliance with a young Jedi on the run if he wants to initiate his plan for revenge.

Who is in Star Wars: Maul – Shadow Lord?

An Oscar nominee joins the cast

Star Wars: Maul – Shadow Lord sees Sam Witwer reprise the role of the former Sith Lord-turned-crime lord from his appearances across Star Wars: The Clone Wars and Star Wars: Rebels. Fellow Rebels stars Vanessa Marshall and Steve Blum join him as the Mandalorian Rook Kast and Zabrak fighter Icarus. Meanwhile, Gideon Adlon takes on the role of the young Twilek Padawan Devon Izara, while Dennis Haysbert’s Master Eeko-Dio Daki hopes to guide her in the Dark Times.

Meanwhile, Oscar-nominee Wagner Moura will provide the voice of TDF captain Brander Lawson, with Richard Ayoade voicing his partner Two-Boots, and Charlie Bushnell voicing his son, Rylee. Chris Diamantopoulos and Stephen Stanton will voice crime lords Looti Vario and Marg Krim, David W. Collins will voice Spybot, and A.J. LoCascio will voice Marrok, the Inquisitor first introduced in Ahsoka.

Subscription with ads

Yes, the Disney Basic plan

Simultaneous streams

Up to 4


When does Star Wars: Maul – Shadow Lord take place?

Stuck between two familiar events

Devon is imprisoned in in Star Wars_ Maul - Shadow Lord. Credit: Lucasfilm

Star Wars: Maul – Shadow Lord is set during the Dark Times, the period of the Star Wars franchise between Revenge of the Sith and A New Hope where the Empire was expanding its power over the galaxy, with those who opposed them choosing to lurk in the shadow. This period has been explored in The Bad Batch, Star Wars Rebels, Obi-Wan Kenobi, Andor, and the Star Wars: Jedi video game franchise, as well as briefly explored in select episodes of the Tales of the Jedi, Tales of the Empire, and Tales of the Underworld anthology series.

Some TV show characters with the Andor logo in the background.


Finished Andor? Stream These Star Wars Shows and Movies Next

The Star Wars universe has plenty to watch to keep the Force flowing now that Andor’s finished.

In the trailer itself, Maul and Devon are seen facing Stormtroopers wearing TK armor, an early version of Stormtrooper armor that was introduced in The Bad Batch season 1. This means that the Empire is still in a time of transition from the Galactic Republic to the forces that we see closer to the Star Wars Original Trilogy. As such, Maul – Shadow Lord events are likely happening concurrently with the events of The Bad Batch’s later two seasons.

Maul – Shadow Lord can finally explain the final years of the Sith Lord’s life

Time to explore new horizons

Maul ignites half of his lightsaber in in Star Wars_ Maul - Shadow Lord. Credit: Lucasfilm

While The Clone Wars successfully resurrected Maul and Rebels would give him a fitting end, there is still a large portion of his story left unexplored. While it is unclear whether the series will receive multiple seasons, the show will explore how he rearranged his forces from the Shadow Collective into Crimson Dawn, the faction first introduced in Solo: A Star Wars Story. Paul Bettany’s Dryden Vos did feature as a cameo in The Clone Wars’s final season, but the arc largely focused on Maul’s Mandalorian forces over his other agents. As such, Maul – Shadow Lord can complete his turn from a man well-aware of Smith’s schemes into his own fully-fledged criminal mastermind.

Furthermore, the presence of Devon in Maul’s story is allowing Lucasfilm to dust off long-scrapped plans. Prior to the Disney acquisition, a Darth Maul-focused game was in development that saw Maul paired with Darth Talon, another red-skinned Twilek, at the behest of George Lucas himself, as the pair took on the galaxy. While Devon may not be a direct adaptation of Talon in the existing canon, Witwer has teased that the series will finally adapt several unused concepts for Maul to screen, and Devon’s visual similarities to Talon could suggest that the series will fulfill one of Lucas’s final ideas for the franchise.

When will Star Wars: Maul – Shadow Lord stream?

Two-episode premiere coming soon

Maul in hiding in in Star Wars_ Maul - Shadow Lord. Credit: Lucasfilm

Star Wars: Maul – Shadow Lord will arrive on Disney+ on April 6th with a two-episode premiere. The series will then release two new episodes every Monday, culminating in the finale on May 4. While one of the shorter Star Wars series, Maul’s long-awaited 10-part story will finally give fans a glimpse into the mind of one of the Dark Side’s most terrifying warriors.



Source link