CVE-2018-19524

9.8 CRITICAL

📋 TL;DR

This is a critical stack overflow vulnerability in Skyworth GPON home gateway devices that allows remote attackers to cause denial of service or achieve unauthenticated remote code execution by sending a long password to the Web_passwd function. The vulnerability affects specific Skyworth DT741, DT721-cb, and DT741-cb converged terminal devices. Attackers can control multiple registers (S0-S4, T4-T7) to potentially execute arbitrary code.

💻 Affected Systems

Products:
  • Shenzhen Skyworth DT741 Converged Intelligent Terminal
  • Skyworth DT721-cb
  • Skyworth DT741-cb
Versions: SDOTBGN1 firmware versions (specific vulnerable versions not detailed in CVE)
Operating Systems: Embedded Linux/GPON firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with SDOTBGN1 hardware/software configuration. These are GPON/EPON+IPTV converged terminals used as home gateways.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote unauthenticated attackers gain full control of the device, enabling them to intercept/modify network traffic, pivot to internal networks, or create persistent backdoors.

🟠

Likely Case

Denial of service causing device crashes and network disruption, with potential for remote code execution by skilled attackers.

🟢

If Mitigated

Limited to denial of service if exploit attempts are blocked at network perimeter, though RCE remains possible if devices are exposed.

🌐 Internet-Facing: HIGH - These are internet-facing home gateway devices that process authentication requests from WAN interfaces.
🏢 Internal Only: MEDIUM - If devices are only accessible internally, risk is reduced but still significant due to potential lateral movement.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Public exploit details and proof-of-concept code are available in security advisories. The vulnerability requires crafting specific long password inputs to trigger the stack overflow.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in CVE

Vendor Advisory: No official vendor advisory found in references

Restart Required: Yes

Instructions:

1. Check with Skyworth for firmware updates. 2. If update available, download from vendor portal. 3. Backup configuration. 4. Apply firmware update via web interface. 5. Reboot device. 6. Verify fix.

🔧 Temporary Workarounds

Network Access Control

linux

Block external access to device web interfaces using firewall rules

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Change Default Credentials

all

Ensure strong, unique passwords are set to reduce attack surface

🧯 If You Can't Patch

  • Isolate affected devices in separate network segments with strict firewall rules
  • Implement network-based intrusion prevention systems (IPS) to detect and block exploit attempts

🔍 How to Verify

Check if Vulnerable:

Check device model and firmware version via web interface (typically http://device-ip/status.html or similar). Look for DT741, DT721-cb, or DT741-cb with SDOTBGN1 in version string.

Check Version:

curl -s http://device-ip/status.html | grep -i 'firmware\|version\|model'

Verify Fix Applied:

Verify firmware version has been updated to a version not listed as vulnerable. Test with controlled exploit attempt in lab environment.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts with unusually long passwords
  • Device crash/restart logs
  • Segmentation fault errors in system logs

Network Indicators:

  • HTTP POST requests to authentication endpoints with >1000 character password fields
  • Unusual traffic patterns to/from GPON devices

SIEM Query:

source="firewall" AND (dst_port=80 OR dst_port=443) AND url="*passwd*" AND content_length>1000

🔗 References

📤 Share & Export