CVE-2017-12577
📋 TL;DR
This vulnerability allows attackers to execute arbitrary commands with root privileges on PLANEX CS-QR20 routers by exploiting a hardcoded admin:password credential in the Android app. Attackers can access a hidden API endpoint to gain complete system control. Anyone using PLANEX CS-QR20 routers with firmware version 1.30 is affected.
💻 Affected Systems
- PLANEX CS-QR20
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to install persistent backdoors, steal all network traffic, pivot to internal networks, or brick the device.
Likely Case
Attackers gain full administrative control over the router to modify configurations, intercept traffic, or use as a foothold for further attacks.
If Mitigated
If isolated from untrusted networks and with strict access controls, impact is limited to local network compromise only.
🎯 Exploit Status
Exploitation requires network access to the router and knowledge of the hardcoded credentials and hidden API endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No vendor advisory found
Restart Required: No
Instructions:
No official patch available. Check PLANEX website for firmware updates, but none have been released addressing this specific CVE.
🔧 Temporary Workarounds
Disable remote management
allDisable remote administration features and ensure the router is not accessible from the internet
Network segmentation
allIsolate the router on a separate VLAN with strict firewall rules limiting access
🧯 If You Can't Patch
- Replace the affected router with a different model from a vendor that provides security updates
- Implement strict network access controls and monitor for suspicious API calls to /goform/SystemCommand
🔍 How to Verify
Check if Vulnerable:
Check router firmware version via web interface or SSH. If version is 1.30, the device is vulnerable. Also test if accessing /goform/SystemCommand with admin:password credentials returns a command execution response.
Check Version:
Check router web interface or use: curl -u admin:password http://router-ip/status.cgi | grep firmware
Verify Fix Applied:
Verify firmware has been updated to a version later than 1.30, or test that the hardcoded credentials no longer work and the API endpoint is disabled.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /goform/SystemCommand
- Authentication attempts with admin:password credentials
- Unusual command execution in system logs
Network Indicators:
- POST requests to /goform/SystemCommand endpoint
- Traffic containing command injection patterns to router management interface
SIEM Query:
source="router_logs" AND (uri="/goform/SystemCommand" OR user="admin")