Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-27359

CVE-2023-27359: TP-Link Archer AX21 Privilege Escalation

CVE-2023-27359 is a privilege escalation vulnerability in TP-Link Archer AX21 routers caused by a race condition in the hotplugd daemon. This article covers the technical details, affected versions, and mitigation strategies.

Published: February 4, 2026

CVE-2023-27359 Overview

CVE-2023-27359 is a race condition vulnerability affecting the hotplugd daemon in TP-Link Archer AX21 routers. This vulnerability allows remote attackers to gain unauthorized access to LAN-side services on affected installations without requiring authentication. The flaw exists within firewall rule handling, enabling attackers to access resources that should only be available to the LAN interface.

When exploited in conjunction with other vulnerabilities, an attacker can leverage this race condition to execute arbitrary code in the context of the root user, potentially leading to complete device compromise.

Critical Impact

Remote unauthenticated attackers can bypass firewall restrictions to access LAN-only services, potentially chaining with other vulnerabilities for root-level code execution on affected TP-Link routers.

Affected Products

  • TP-Link Archer AX21 Firmware version 1.1.1 Build 20220603
  • TP-Link Archer AX21 Hardware version 3.0
  • TP-Link AX1800 series routers with vulnerable hotplugd daemon

Discovery Timeline

  • 2024-05-03 - CVE-2023-27359 published to NVD
  • 2025-08-06 - Last updated in NVD database

Technical Details for CVE-2023-27359

Vulnerability Analysis

This vulnerability is classified as a race condition (CWE-362) affecting the hotplugd daemon responsible for managing firewall rules on TP-Link Archer AX21 routers. The race condition occurs during firewall rule processing, creating a timing window where network-accessible attackers can bypass intended access restrictions.

The vulnerability is network-exploitable and requires no authentication, though exploitation complexity is elevated due to the race condition's timing requirements. Successful exploitation grants attackers access to services that should be restricted to the local network segment only. This access can serve as a stepping stone for more severe attacks when combined with additional vulnerabilities present on the device.

The hotplugd daemon is responsible for dynamically managing system events and associated firewall rule updates. When network interfaces or services change state, the daemon applies corresponding firewall rules. The race condition creates a brief window during rule transitions where the firewall may not properly enforce LAN-only access restrictions.

Root Cause

The root cause of CVE-2023-27359 lies in improper synchronization within the hotplugd daemon's firewall rule management logic. When firewall rules are being updated or applied, there exists a time-of-check to time-of-use (TOCTOU) window where the intended access restrictions are not properly enforced.

Specifically, the daemon fails to implement proper locking mechanisms or atomic operations when transitioning firewall states. This allows network traffic arriving during the transition period to bypass rules that would otherwise restrict WAN-side access to LAN-only services.

Attack Vector

The attack is network-based and does not require authentication. An attacker must time their network requests to coincide with the vulnerable window during firewall rule transitions. The attack can be performed remotely from the WAN side of the router.

The exploitation scenario involves:

  1. Identifying a target TP-Link Archer AX21 router running vulnerable firmware
  2. Triggering or waiting for conditions that cause firewall rule updates via the hotplugd daemon
  3. Sending carefully timed network requests during the race condition window
  4. Gaining access to LAN-side services that should be inaccessible from the WAN

The vulnerability can be chained with other security flaws to achieve more severe impacts, including arbitrary code execution with root privileges. For detailed technical information, refer to the Zero Day Initiative Advisory ZDI-23-452.

Detection Methods for CVE-2023-27359

Indicators of Compromise

  • Unexpected WAN-side connections to LAN-only services in router logs
  • Anomalous traffic patterns indicating repeated connection attempts timed with system events
  • Evidence of service access from external IP addresses that should be restricted to internal networks
  • Unusual hotplugd daemon activity or rapid firewall rule transitions

Detection Strategies

  • Monitor router logs for WAN-originated connections to services configured as LAN-only
  • Implement network monitoring to detect external access attempts to internal service ports
  • Deploy intrusion detection rules to identify repeated connection attempts that may indicate race condition exploitation
  • Review device firmware versions and compare against known vulnerable versions (1.1.1 Build 20220603)

Monitoring Recommendations

  • Enable comprehensive logging on TP-Link routers where available
  • Monitor network traffic at the perimeter for anomalous access patterns to router management interfaces
  • Implement alerting for any successful connections to LAN-restricted services originating from WAN addresses
  • Regularly audit firewall rule configurations and verify expected access restrictions are in place

How to Mitigate CVE-2023-27359

Immediate Actions Required

  • Update TP-Link Archer AX21 router firmware to the latest available version from TP-Link
  • Disable unnecessary LAN-side services that do not require external access
  • Implement additional network segmentation to isolate vulnerable devices
  • Consider placing an additional firewall in front of affected routers until patching is complete

Patch Information

TP-Link has addressed this vulnerability in updated firmware releases for the Archer AX21 router. Users should download and apply the latest firmware version from the official TP-Link support website. The vulnerability was tracked as ZDI-CAN-19664 by the Zero Day Initiative and published as ZDI-23-452.

Verify firmware versions and update any devices running version 1.1.1 Build 20220603 or earlier affected versions.

Workarounds

  • Place affected routers behind an additional stateful firewall that can enforce LAN/WAN access restrictions
  • Disable or restrict access to LAN-side services that are not required for operation
  • Use network access control lists (ACLs) on upstream network devices to limit access to the router
  • Monitor for and block suspicious traffic patterns indicative of exploitation attempts
bash
# Configuration example - Verify router firmware version via CLI (if available)
# Check current firmware version
cat /etc/openwrt_release

# Recommended: Update firmware through TP-Link web interface
# Navigate to Advanced > System Tools > Firmware Upgrade
# Download latest firmware from https://www.tp-link.com/support/

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechTp Link

  • SeverityHIGH

  • CVSS Score8.1

  • EPSS Probability1.87%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-362
  • Technical References
  • Zero Day Initiative Advisory ZDI-23-452
  • Related CVEs
  • CVE-2025-7851: TP-Link FR307-M2 Privilege Escalation Flaw

  • CVE-2026-5039: TP-Link TL-WR841N DoS Vulnerability

  • CVE-2026-30814: TP-Link Archer AX53 Buffer Overflow Flaw

  • CVE-2025-15519: TP-Link Archer NX RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English