CVE-2018-20377
📋 TL;DR
This vulnerability allows remote attackers to retrieve Wi-Fi credentials from Orange Livebox 00.96.320S devices via an unauthenticated web endpoint. If the admin password matches the Wi-Fi password or uses the default value, attackers can gain full administrative control. This affects Orange Livebox users with specific firmware versions.
💻 Affected Systems
- Orange Livebox 00.96.320S
📦 What is this software?
Arv7519rw22 Livebox 2.1 Firmware by Orange
Arv7519rw22 Livebox 2.1 Firmware by Orange
Arv7519rw22 Livebox 2.1 Firmware by Orange
⚠️ Risk & Real-World Impact
Worst Case
Full compromise of the router including network traffic interception, device hijacking, and lateral movement into connected networks.
Likely Case
Wi-Fi credential theft leading to unauthorized network access and potential man-in-the-middle attacks.
If Mitigated
Limited to Wi-Fi credential exposure if admin password is strong and unique.
🎯 Exploit Status
Simple HTTP GET request to /get_getnetworkconf.cgi on port 8080 returns Wi-Fi credentials in plain text.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Later firmware versions from Orange
Vendor Advisory: https://badpackets.net/over-19000-orange-livebox-adsl-modems-are-leaking-their-wifi-credentials/
Restart Required: Yes
Instructions:
1. Log into Livebox admin interface. 2. Check for firmware updates in system settings. 3. Apply available updates. 4. Reboot device after update.
🔧 Temporary Workarounds
Block port 8080 externally
linuxPrevent external access to the vulnerable endpoint
iptables -A INPUT -p tcp --dport 8080 -j DROP
Change admin and Wi-Fi passwords
allUse strong, unique passwords for admin interface and Wi-Fi
🧯 If You Can't Patch
- Change admin password to a strong, unique value different from Wi-Fi password
- Disable remote administration and restrict management interface to local network only
🔍 How to Verify
Check if Vulnerable:
curl -v http://[device_ip]:8080/get_getnetworkconf.cgi - check if Wi-Fi credentials are returned in plain text
Check Version:
Check firmware version in Livebox admin interface under System Information
Verify Fix Applied:
Attempt the same curl command after patching - should return error or no credentials
📡 Detection & Monitoring
Log Indicators:
- HTTP GET requests to /get_getnetworkconf.cgi on port 8080 from external IPs
Network Indicators:
- Unusual traffic to port 8080 from external sources
- Multiple failed login attempts followed by credential retrieval
SIEM Query:
source_port=8080 AND uri_path="/get_getnetworkconf.cgi" AND src_ip NOT IN (internal_subnets)
🔗 References
- https://badpackets.net/over-19000-orange-livebox-adsl-modems-are-leaking-their-wifi-credentials/
- https://github.com/zadewg/LIVEBOX-0DAY
- https://news.ycombinator.com/item?id=18745533
- https://web.archive.org/web/20181223120225/https://badpackets.net/over-19000-orange-livebox-adsl-modems-are-leaking-their-wifi-credentials/
- https://badpackets.net/over-19000-orange-livebox-adsl-modems-are-leaking-their-wifi-credentials/
- https://github.com/zadewg/LIVEBOX-0DAY
- https://news.ycombinator.com/item?id=18745533
- https://web.archive.org/web/20181223120225/https://badpackets.net/over-19000-orange-livebox-adsl-modems-are-leaking-their-wifi-credentials/