New Release Recommended Firmware Update for the Archer AX21
Our teams have been made aware of reports of a vulnerability that has been discovered for the Archer AX21 with the REC vulnerability of CVE-2023-1389 being added to the Mirai botnet Arsenal.
TP-Link always takes security vulnerabilities very seriously and actively deals with them upon receiving a notification. Our teams have already released firmware on the official website to remove the vulnerability and has already been pushed the firmware to customers' devices.
Please Select Your Hardware Version to See the Most Up-To-Date List of Available Firmware Versions:
Your Archer AX21 will automatically receive update notifications in the web administration interface and in the Tether application.
TP-Link strongly recommends that you download and update to the latest firmware for this product model as soon as possible. If you are using an older firmware version and have not yet been prompted to upgrade to the latest version, please update your router manually by following the steps outlined in this FAQ: How to Update the Firmware of Your TP-Link Router
Disclaimer
The vulnerability will remain if you do not take all recommended actions. TP-Link cannot bear any responsibility for consequences that could have been avoided by following the recommendations in this statement.
You can read the official communication on the update in this FAQ:
Statement on Archer AX21 Remote Code Execution Vulnerability (CVE-2023-1389)