CVE-2017-18369

9.8 CRITICAL

📋 TL;DR

This CVE describes a critical command injection vulnerability in Billion 5200W-T routers distributed by TrueOnline. Unauthenticated attackers can execute arbitrary commands on the router by exploiting the syslogServerAddr parameter in the Remote System Log forwarding function. This affects all users with vulnerable router firmware exposed to network access.

💻 Affected Systems

Products:
  • Billion 5200W-T router distributed by TrueOnline
Versions: Firmware version 1.02b.rc5.dt49
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerable adv_remotelog.asp page is accessible without authentication by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router compromise allowing persistent backdoor installation, credential theft, network traffic interception, and lateral movement to connected devices.

🟠

Likely Case

Router takeover leading to DNS hijacking, credential harvesting, and use as pivot point for internal network attacks.

🟢

If Mitigated

Limited impact if router is behind firewall with no external access and proper network segmentation.

🌐 Internet-Facing: HIGH - The vulnerability is accessible without authentication and routers are typically internet-facing devices.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they have network access to the router's management interface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public PoCs exist showing simple curl commands can exploit this vulnerability. The attack requires no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Later firmware versions from vendor

Vendor Advisory: Not publicly documented in vendor advisory

Restart Required: Yes

Instructions:

1. Check current firmware version via router admin interface. 2. Download latest firmware from vendor website. 3. Upload and apply firmware update through admin interface. 4. Reboot router to complete installation.

🔧 Temporary Workarounds

Disable Remote System Logging

all

Disable the vulnerable Remote System Log forwarding feature to prevent exploitation.

Restrict Management Interface Access

all

Configure firewall rules to restrict access to router management interface to trusted IPs only.

🧯 If You Can't Patch

  • Replace router with non-vulnerable model
  • Place router behind dedicated firewall with strict inbound/outbound rules

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is 1.02b.rc5.dt49, the device is vulnerable.

Check Version:

Login to router admin interface and check System Status or Firmware Information page.

Verify Fix Applied:

After firmware update, verify version is no longer 1.02b.rc5.dt49 and test that adv_remotelog.asp page is no longer accessible or properly sanitizes input.

📡 Detection & Monitoring

Log Indicators:

  • Unusual commands in system logs
  • Multiple failed access attempts to adv_remotelog.asp
  • Suspicious syslog configuration changes

Network Indicators:

  • HTTP requests to adv_remotelog.asp with shell metacharacters in parameters
  • Outbound connections from router to unexpected destinations

SIEM Query:

http.url:*adv_remotelog.asp* AND (http.param:*syslogServerAddr* AND http.param:*[;&|`]*

🔗 References

📤 Share & Export