INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 2h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 5h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 6h Global ransomware Multiple sectors (U.S. companies) CRITICAL 6h Global malware Financial Services, Cryptocurrency CRITICAL 7h Global malware Technology and Cloud Services HIGH 7h Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 2h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 5h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 6h Global ransomware Multiple sectors (U.S. companies) CRITICAL 6h Global malware Financial Services, Cryptocurrency CRITICAL 7h Global malware Technology and Cloud Services HIGH 7h Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 2h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 5h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 6h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 6h Global ransomware Multiple sectors (U.S. companies) CRITICAL 6h Global malware Financial Services, Cryptocurrency CRITICAL 7h Global malware Technology and Cloud Services HIGH 7h
Vulnerabilities

CVE-2023-33538

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
TP-Link Multiple Routers Command Injection Vulnerability — TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 contain a command injection vulnerability via the component /userRpm/WlanNetwo
Published: Jun 16, 2025  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

TP-Link Multiple Routers Command Injection Vulnerability — TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

🤖 AI Executive Summary

CVE-2023-33538 is a critical command injection vulnerability (CVSS 9.0) affecting multiple TP-Link router models including TL-WR940N, TL-WR841N, and TL-WR740N via the /userRpm/WlanNetworkRpm component. An authenticated or network-adjacent attacker can inject arbitrary OS commands, potentially achieving full device compromise and lateral movement into connected networks. These devices are end-of-life/end-of-service, meaning no further vendor support is expected, significantly increasing long-term risk. The widespread deployment of these budget routers in homes, SMEs, and potentially government branch offices makes this a high-priority concern.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 18, 2026 08:48
🇸🇦 Saudi Arabia Impact Assessment
Saudi Arabia's widespread adoption of budget TP-Link routers in SMEs, residential networks, and potentially government branch offices creates significant exposure. Key at-risk sectors include: (1) Government/NCA — branch offices and remote workers using these EoL routers as edge devices could expose internal government networks; (2) Banking/SAMA — SME clients and third-party vendors using these routers may create supply chain risk into banking networks; (3) Energy/ARAMCO — contractor and vendor networks using these devices could serve as pivot points into OT-adjacent environments; (4) Telecom/STC — ISP-distributed routers of these models in subscriber premises could be weaponized for large-scale botnet operations targeting Saudi infrastructure; (5) Healthcare — smaller clinics and medical offices relying on budget networking equipment face patient data exposure risk. The EoL status means no official patches will be issued, making replacement the only long-term solution.
🏢 Affected Saudi Sectors
Government Banking Energy Telecom Healthcare Education SME/Retail Residential/ISP
⚖️ Saudi Risk Score (AI)
8.7
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS (0-24 hours):
1. Conduct an asset inventory to identify all TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 devices across your environment and third-party/vendor networks.
2. Disable remote management (WAN-side access) on all identified devices immediately.
3. Restrict access to the router admin interface to trusted internal IPs only via ACLs.
4. Isolate affected routers from critical network segments using VLAN segmentation.

PATCHING GUIDANCE:
5. No official patch is expected given EoL/EoS status — device replacement is the recommended remediation.
6. Replace affected devices with supported TP-Link models or alternative vendors with active security support.
7. If replacement is not immediately feasible, apply the latest available firmware from TP-Link's official site as a temporary measure.

COMPENSATING CONTROLS:
8. Deploy IDS/IPS rules to detect exploitation attempts targeting /userRpm/WlanNetworkRpm endpoint.
9. Enable network monitoring for unusual outbound traffic from router IP addresses (C2 beaconing, lateral movement).
10. Implement network segmentation to limit blast radius if a device is compromised.
11. Enforce strong, unique admin credentials on all routers and disable default accounts.
12. Disable UPnP and any unnecessary services on affected devices.

DETECTION RULES:
13. Alert on HTTP POST requests to /userRpm/WlanNetworkRpm containing shell metacharacters (;, |, &&, $(), backticks).
14. Monitor for unexpected outbound connections from router management IPs.
15. Deploy honeypot router admin pages to detect scanning activity.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية (0-24 ساعة):
1. إجراء جرد شامل للأصول لتحديد جميع أجهزة TP-Link TL-WR940N V2/V4 وTL-WR841N V8/V10 وTL-WR740N V1/V2 في بيئتك وشبكات الموردين والأطراف الثالثة.
2. تعطيل الإدارة عن بُعد (الوصول من جانب WAN) على جميع الأجهزة المحددة فوراً.
3. تقييد الوصول إلى واجهة إدارة الموجّه على عناوين IP داخلية موثوقة فقط عبر قوائم التحكم بالوصول.
4. عزل الموجّهات المتأثرة عن قطاعات الشبكة الحيوية باستخدام تقسيم VLAN.

إرشادات التصحيح:
5. لا يُتوقع صدور تصحيح رسمي نظراً لحالة EoL/EoS — يُوصى باستبدال الجهاز كحل نهائي.
6. استبدال الأجهزة المتأثرة بطرازات TP-Link مدعومة أو موردين بديلين يوفرون دعماً أمنياً نشطاً.
7. إذا تعذّر الاستبدال الفوري، تطبيق أحدث إصدار من البرامج الثابتة المتاح من الموقع الرسمي لـ TP-Link كإجراء مؤقت.

ضوابط التعويض:
8. نشر قواعد IDS/IPS للكشف عن محاولات الاستغلال التي تستهدف نقطة النهاية /userRpm/WlanNetworkRpm.
9. تفعيل مراقبة الشبكة للكشف عن حركة المرور الصادرة غير المعتادة من عناوين IP للموجّهات.
10. تطبيق تقسيم الشبكة للحد من نطاق الضرر في حال اختراق أي جهاز.
11. فرض بيانات اعتماد إدارية قوية وفريدة على جميع الموجّهات وتعطيل الحسابات الافتراضية.
12. تعطيل UPnP وأي خدمات غير ضرورية على الأجهزة المتأثرة.

قواعد الكشف:
13. التنبيه على طلبات HTTP POST إلى /userRpm/WlanNetworkRpm التي تحتوي على محارف خاصة بالصدفة (;، |، &&، $()، backticks).
14. مراقبة الاتصالات الصادرة غير المتوقعة من عناوين IP لإدارة الموجّهات.
15. نشر صفحات إدارة موجّه وهمية للكشف عن نشاط المسح.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-4-2: Asset Management — EoL device tracking and lifecycle management ECC-2-3-1: Network Security — Network segmentation and access control ECC-2-3-3: Network Security — Secure configuration of network devices ECC-2-5-1: Vulnerability Management — Timely identification and remediation of vulnerabilities ECC-2-5-3: Patch Management — Application of security patches and firmware updates ECC-3-3-1: Third-Party and Cloud Computing — Vendor/supplier network security requirements
🔵 SAMA CSF
3.3.5 — Cyber Security Architecture: Network segmentation and perimeter security 3.3.6 — Infrastructure Security: Secure configuration and hardening of network devices 3.3.9 — Vulnerability Management: Identification and remediation of critical vulnerabilities 3.3.10 — Patch Management: Timely application of firmware and software patches 3.4.2 — Third-Party Cybersecurity: Vendor and supplier network security controls
🟡 ISO 27001:2022
A.8.8 — Management of technical vulnerabilities A.8.9 — Configuration management A.8.20 — Networks security A.8.21 — Security of network services A.8.22 — Segregation of networks A.5.9 — Inventory of information and other associated assets
🟣 PCI DSS v4.0
Requirement 1.3 — Network access controls between trusted and untrusted networks Requirement 6.3.3 — All system components protected from known vulnerabilities by patching Requirement 12.3.4 — Hardware and software technologies reviewed for continued security support
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
TP-Link:Multiple Routers
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS91.32%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2025-07-07
Published 2025-06-16
Source Feed cisa_kev
Views 4
🇸🇦 Saudi Risk Score
8.7
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.