CVE-2013-3367

9.8 CRITICAL

📋 TL;DR

CVE-2013-3367 is a critical authentication bypass vulnerability in TRENDnet TEW-691GR and TEW-692GR routers. It allows unauthenticated attackers to access an undocumented TELNET service via a specific backdoor web page with a hardcoded password, potentially leading to full device compromise. This affects all users of these router models with vulnerable firmware.

💻 Affected Systems

Products:
  • TRENDnet TEW-691GR
  • TRENDnet TEW-692GR
Versions: All firmware versions prior to patched releases (specific version unknown due to limited vendor disclosure)
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration; no special settings required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router takeover allowing attacker to intercept all network traffic, modify DNS settings, install malware, pivot to internal network devices, and maintain persistent access.

🟠

Likely Case

Router configuration compromise leading to traffic interception, DNS hijacking, credential theft, and potential lateral movement to connected devices.

🟢

If Mitigated

Limited impact if router is behind firewall with strict inbound rules, though internal network compromise remains possible if attacker gains initial access.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to attackers worldwide.
🏢 Internal Only: HIGH - Once compromised, attackers can pivot to internal systems and intercept all internal network traffic.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP request to specific URL with hardcoded password parameter; trivial to automate.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown specific version - check TRENDnet support for latest firmware

Vendor Advisory: Not publicly available - check TRENDnet support portal

Restart Required: Yes

Instructions:

1. Log into router admin interface
2. Navigate to firmware update section
3. Download latest firmware from TRENDnet support site
4. Upload and apply firmware update
5. Reboot router after update completes

🔧 Temporary Workarounds

Disable remote administration

all

Prevent external access to router administration interface

Block TELNET service

linux

Use firewall rules to block TELNET port 23 inbound and outbound

iptables -A INPUT -p tcp --dport 23 -j DROP
iptables -A OUTPUT -p tcp --dport 23 -j DROP

🧯 If You Can't Patch

  • Replace affected routers with newer models from different vendors
  • Place routers behind dedicated firewall with strict inbound/outbound rules blocking all unnecessary ports

🔍 How to Verify

Check if Vulnerable:

Attempt HTTP GET request to router IP: http://[router-ip]/backdoor?password=j78G¬DFdg_24Mhw3 - if returns 200 OK, device is vulnerable

Check Version:

Check router web interface admin page or use: telnet [router-ip] 23 (if accessible) and check banner

Verify Fix Applied:

Same check should return 404 or access denied after patching; also verify TELNET service is not accessible on port 23

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /backdoor with password parameter
  • Unexpected TELNET connections from WAN interface
  • Multiple failed login attempts followed by successful access

Network Indicators:

  • Port 23 (TELNET) traffic to/from router
  • HTTP requests containing 'backdoor' and 'password=j78G¬DFdg_24Mhw3' in URL

SIEM Query:

source_ip=router_ip AND (url_path="/backdoor" OR dest_port=23)

🔗 References

📤 Share & Export