CVE-2017-14135

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary operating system commands on opendreambox 2.0.0 systems via shell metacharacters in the command parameter to the /script URI in the webadmin plugin. It affects systems running opendreambox 2.0.0 with the webadmin plugin enabled. Attackers can gain full control of affected systems without authentication.

💻 Affected Systems

Products:
  • opendreambox
Versions: 2.0.0
Operating Systems: Linux-based embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the webadmin plugin to be installed and enabled. The vulnerability is in the enigma2-plugins repository's webadmin component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install malware, exfiltrate data, pivot to other systems, or use the system for botnet activities.

🟠

Likely Case

Remote code execution leading to system takeover, data theft, or deployment of cryptocurrency miners or ransomware.

🟢

If Mitigated

No impact if the webadmin plugin is disabled or proper network segmentation prevents access to the vulnerable endpoint.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication and affects a web interface that may be exposed to the internet.
🏢 Internal Only: HIGH - Even internally, this provides unauthenticated remote code execution capability to any network user.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward using curl or similar tools to send malicious commands to the /script endpoint. The referenced blog post demonstrates practical exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch exists. The recommended approach is to disable the webadmin plugin or upgrade to a newer version of opendreambox if available.

🔧 Temporary Workarounds

Disable webadmin plugin

linux

Remove or disable the vulnerable webadmin plugin to eliminate the attack surface

Remove the webadmin plugin files or disable via plugin manager

Network access control

linux

Restrict network access to the opendreambox web interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Disable the webadmin plugin immediately
  • Implement strict network segmentation and firewall rules to block all external access to the opendreambox web interface

🔍 How to Verify

Check if Vulnerable:

Check if opendreambox 2.0.0 is running with webadmin plugin enabled and accessible via network

Check Version:

Check opendreambox version via system information or package manager

Verify Fix Applied:

Verify webadmin plugin is disabled or removed, and test that /script endpoint no longer responds

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /script endpoint
  • Commands with shell metacharacters in web logs
  • Unexpected process execution from web server context

Network Indicators:

  • HTTP POST requests to /script with command parameters containing shell metacharacters
  • Outbound connections from opendreambox to unexpected destinations

SIEM Query:

web_access_logs WHERE url_path CONTAINS '/script' AND (request_body CONTAINS ';' OR request_body CONTAINS '|' OR request_body CONTAINS '&' OR request_body CONTAINS '`' OR request_body CONTAINS '$(')

🔗 References

📤 Share & Export