CVE-2016-10305

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to gain full root access to affected Trango wireless networking devices via SSH/TELNET using a hidden account with a default password that was publicly exposed. All organizations using the listed Trango products with vulnerable firmware versions are affected. The hidden root account provides complete control over the device's underlying UNIX operating system.

💻 Affected Systems

Products:
  • Trango Apex
  • ApexLynx
  • ApexOrion
  • ApexPlus
  • Giga
  • GigaLynx
  • GigaOrion
  • GigaPlus
  • GigaPro
  • StrataLink
  • StrataPro
Versions: Apex <= 2.1.1, ApexLynx < 2.0, ApexOrion < 2.0, ApexPlus <= 3.2.0, Giga <= 2.6.1, GigaLynx < 2.0, GigaOrion < 2.0, GigaPlus <= 3.2.3, GigaPro <= 1.4.1, StrataLink < 3.0, StrataPro all versions
Operating Systems: Embedded UNIX OS
Default Config Vulnerable: ⚠️ Yes
Notes: The hidden root account exists by default in affected firmware versions. The default password was publicly available in software update packages on Trango's FTP server.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of network infrastructure, allowing attackers to intercept/modify all traffic, pivot to internal networks, install persistent backdoors, or disable critical communications.

🟠

Likely Case

Unauthorized root access leading to network reconnaissance, data interception, device configuration changes, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict access controls, SSH/TELNET disabled, and network segmentation prevents lateral movement.

🌐 Internet-Facing: HIGH - Devices exposed to the internet can be directly exploited using the known default credentials.
🏢 Internal Only: HIGH - Internal attackers or compromised systems can exploit this to gain full control of network infrastructure.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only SSH/TELNET access and knowledge of the default credentials. The vulnerability details and affected devices are publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apex 2.1.2+, ApexLynx 2.0+, ApexOrion 2.0+, ApexPlus 3.2.1+, Giga 2.6.2+, GigaLynx 2.0+, GigaOrion 2.0+, GigaPlus 3.2.4+, GigaPro 1.4.2+, StrataLink 3.0+, StrataPro check with vendor

Vendor Advisory: http://blog.iancaling.com/post/153011925478

Restart Required: Yes

Instructions:

1. Contact Trango support for firmware updates. 2. Download appropriate firmware version for your device model. 3. Follow Trango's firmware upgrade procedure. 4. Verify the hidden root account is removed or password changed.

🔧 Temporary Workarounds

Disable SSH/TELNET Access

all

Disable SSH and TELNET services if not required for operations

Check device configuration interface for service disable options

Network Access Control

linux

Restrict SSH/TELNET access to trusted management networks only using firewall rules

iptables -A INPUT -p tcp --dport 22 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 23 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -j DROP
iptables -A INPUT -p tcp --dport 23 -j DROP

🧯 If You Can't Patch

  • Change default passwords on all accounts and disable the hidden root account if possible
  • Isolate affected devices in separate network segments with strict firewall rules

🔍 How to Verify

Check if Vulnerable:

Attempt SSH/TELNET connection to device using known default credentials for hidden root account

Check Version:

Check device web interface or use 'show version' command via console

Verify Fix Applied:

Verify SSH/TELNET access with default credentials fails and check firmware version is patched

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful root login
  • SSH/TELNET connections from unexpected sources
  • Configuration changes from unknown users

Network Indicators:

  • SSH/TELNET traffic to devices from unauthorized IPs
  • Unusual outbound connections from devices

SIEM Query:

source="device_logs" (event="authentication success" AND user="root") OR (port=22 OR port=23) AND dest_ip="device_ip" AND NOT src_ip IN trusted_ips

🔗 References

📤 Share & Export