Hackers target old TP-Link routers in Mirai malware campaign tied to CVE-2023-33538


Hackers are actively trying to compromise several older TP-Link routers through CVE-2023-33538, a command injection flaw that affects end-of-life models. The risk is real because CISA has already listed the bug in its Known Exploited Vulnerabilities catalog, and Palo Alto Networks Unit 42 says it has observed exploitation attempts in the wild.

The affected devices include TP-Link TL-WR940N v2 and v4, TL-WR740N v1 and v2, and TL-WR841N v8 and v10. These routers no longer receive regular vendor support, which leaves many owners without an official security fix.

Researchers say the attackers are trying to turn vulnerable routers into part of a Mirai-based botnet. In simple terms, that means a compromised home or small-office router could get pulled into a network of hijacked devices used for follow-on attacks such as distributed denial-of-service activity.

How the attacks work

According to Unit 42, the flaw sits in the router’s web management interface at /userRpm/WlanNetworkRpm. The vulnerability allows command injection, which means a crafted request can make the device run commands it should reject.

The observed attack traffic attempted to fetch a malware file named arm7 from a remote server, mark it as executable, and run it on the router. Unit 42 linked that file to a Mirai-based Condi botnet variant that communicates with a command-and-control server after infection.

The update_bins function with a hard-coded IP address and port (Source – Unit42)

There is one important detail here. The exploitation attempts seen by researchers were active, but not fully correct. Unit 42 said the attackers used the ssid parameter instead of the vulnerable ssid1 parameter, and the payload also relied on wget, which is not present in the BusyBox environment on these devices. That means the exploit attempts they observed would fail as written, even though the underlying bug remains exploitable.

Why this still matters

This is not a case where defenders can relax because one attacker made mistakes. Unit 42 made clear that a more accurate exploit using the correct parameter could still succeed against exposed and vulnerable routers.

That warning carries extra weight because CISA added CVE-2023-33538 to the KEV catalog in June 2025, which means the agency treats it as exploited in the wild. When a flaw reaches KEV status, security teams usually treat it as a priority because attackers have already moved beyond theory.

The bigger problem is the hardware lifecycle. TP-Link’s end-of-life documentation shows these older products have aged out of support, and public vulnerability records note that impacted products should be discontinued. For users still running them, replacement is the safest path.

httpd_start() function graph for the arm7 binary (Source – Unit42)

What researchers found inside the malware

Unit 42 said the arm7 sample includes functions for heartbeats, self-updates, and internal HTTP server activity. The malware also tries to pull fresh copies of itself for multiple CPU architectures, which helps the campaign spread to more kinds of devices.

Researchers also said the binary can start an HTTP server on a random port between 1024 and 65535. Once that happens, an infected device can serve malware to other systems and help grow the botnet further.

The campaign appears to focus on old routers that attackers may expect owners to forget about. That pattern is common in IoT threats because unmaintained network gear often remains online for years, even after official support ends.

Key details at a glance

ItemDetails
VulnerabilityCVE-2023-33538
TypeCommand injection
Affected endpoint/userRpm/WlanNetworkRpm
Affected modelsTL-WR940N v2/v4, TL-WR740N v1/v2, TL-WR841N v8/v10
Exploitation statusActive attempts observed
MalwareMirai-based Condi variant
Patch statusNo normal vendor patch path for these end-of-life models
Best responseReplace affected routers

Sources for the table above:

What users and admins should do now

  • Check the exact router model and hardware version, not just the product family name. Some versions are affected while others are not.
  • Replace any affected end-of-life router instead of waiting for a future fix. TP-Link’s public end-of-life guidance makes clear that these products are no longer in normal support.
  • Change default admin credentials immediately if the device is still online. Unit 42 said exploitation requires authenticated access to the web interface.
  • Restrict remote management and monitor outbound traffic for suspicious connections tied to known malicious infrastructure.

FAQ

Are hackers really exploiting this TP-Link flaw now?

Yes. CISA added CVE-2023-33538 to the Known Exploited Vulnerabilities catalog, and Unit 42 reported seeing exploitation attempts in the wild.

Which TP-Link routers are affected?

Public records identify TL-WR940N v2 and v4, TL-WR740N v1 and v2, and TL-WR841N v8 and v10 as affected models.

Can I patch the router?

For these end-of-life models, normal patch support is no longer the safe assumption. Replacement is the recommended option.

Does the attack work without logging in?

Unit 42 said exploitation requires authenticated access to the router’s web management interface, which makes default or weak admin credentials especially risky.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages