A wave of exploitation attempts is putting legacy networking devices at risk as the TP-Link CVE-2023-33538 vulnerability is actively targeted to deploy Mirai based malware.

Security researchers report that hackers are exploiting flaws in several end of life routers from TP-Link, leveraging the vulnerability to install botnet malware capable of hijacking devices for large scale cyber operations. The affected models include older versions of the TL WR940N, TL WR740N, and TL WR841N, all of which no longer receive security updates.

The vulnerability stems from improper input validation in the routers’ web management interface. Specifically, attackers can send crafted HTTP GET requests to the /userRpm/WlanNetworkRpm endpoint, injecting malicious commands through the ssid parameter. Because the firmware does not adequately filter user input, these commands can be executed directly on the device.

Researchers from Unit 42 at Palo Alto Networks observed large scale scanning and exploitation attempts following the inclusion of CVE-2023-33538 in the Known Exploited Vulnerabilities catalog by CISA in June 2025. Their findings indicate coordinated efforts to compromise vulnerable routers and incorporate them into botnet infrastructure.

Once exploited, the attack downloads an ELF binary known as arm7 from a remote server and executes it on the router. This binary is linked to the Condi botnet, a Mirai based malware family designed to recruit infected devices into a distributed network controlled by attackers. The malware connects to a command and control server and begins executing instructions, including sending heartbeat signals and preparing for further propagation.

The botnet demonstrates advanced persistence mechanisms. It can update itself by downloading variants built for multiple CPU architectures, ensuring compatibility across a wide range of devices. It also launches an internal HTTP server on the compromised router, enabling it to distribute malware to other systems and expand the botnet without additional attacker intervention.

Despite some technical flaws in observed attack attempts, including incorrect parameter targeting and reliance on unavailable system utilities, researchers confirmed that the underlying vulnerability remains exploitable. A more precise attack could successfully compromise devices with minimal effort.

The TP-Link CVE-2023-33538 vulnerability highlights the ongoing risks associated with unsupported hardware. Since the affected routers are end of life, no official patches will be released, leaving replacement as the primary mitigation strategy. Users are also advised to change default credentials, restrict access to management interfaces, and monitor network traffic for suspicious activity.

The continued exploitation of CVE-2023-33538 underscores a broader cybersecurity challenge, where outdated infrastructure becomes an easy target for botnet campaigns. As Mirai based malware continues to evolve, unpatched IoT and networking devices remain a critical weak point in global network security.

Recommended Cyber Technology News :

To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com



🔒 Login or Register to continue reading