Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Organizations Warned of Vulnerability Exploited Against Discontinued TP-Link Routers

CISA warns that a vulnerability impacting multiple discontinued TP-Link router models is exploited in the wild.

CISA

The US cybersecurity agency CISA on Monday warned that threat actors are exploiting a two-year-old vulnerability affecting multiple discontinued TP-Link router models.

Tracked as CVE-2023-33538 (CVSS score of 8.8), the bug is described as a command injection vulnerability in the /userRpm/WlanNetworkRpm component, and impacts the TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 router models.

The issue allows remote attackers to submit special requests, which allows them to execute arbitrary system commands on vulnerable devices.

Proof-of-concept (PoC) exploit code targeting the security defect was published on GitHub last month, but has since been removed.

According to TP-Link’s list (PDF) of discontinued products, support for the TL-WR841N and TL-WR740N routers was discontinued before 2018. The company stopped providing software updates for TL-WR940N last year.

On Monday, CISA added CVE-2023-33538 to its Known Exploited Vulnerabilities (KEV) list, urging users to cease utilization of the affected products, as they are no longer supported.

Additionally, the agency warned of the active exploitation of CVE-2025-43200, a vulnerability in the processing of maliciously crafted photos and videos shared via an iCloud link, which impacts multiple Apple products.

Apple addressed the security defect in February, with the release of iOS 18.3.1, iPadOS 18.3.1, and macOS Sequoia 15.3.1, as well as with updates for older platform iterations.

Advertisement. Scroll to continue reading.

“Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals,” the company’s updated advisory reads.

Last week, Citizen Lab warned that the bug has been exploited to infect at least two journalists’ phones with Paragon’s ‘Graphite’ mobile hacking software.

Per Binding Operational Directive (BOD) 22-01, federal agencies have until July 7 to remove vulnerable TP-Link routers from their environments and update their Apple devices to the latest software releases.

Related: Vulnerability Exploitation Possibly Behind Widespread DrayTek Router Reboots

Related: Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers

Related: Apple Patches First Exploited iOS Zero-Day of 2025

Related: Four-Faith Industrial Router Vulnerability Exploited in Attacks

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Coro, a provider of cybersecurity solutions for SMBs, has appointed Joe Sykora as CEO.

SonicWall has hired Rajnish Mishra as Senior Vice President and Chief Development Officer.

Kenna Security co-founder Ed Bellis has joined Empirical Security as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.