CVE-2019-13412
📋 TL;DR
This vulnerability in HiNet GPON firmware allows unauthenticated remote attackers to read arbitrary files on affected devices by sending specific commands to a service on port 3097. It affects HiNet GPON routers with firmware versions before I040GWR190731. The high CVSS score reflects the combination of network accessibility, no authentication requirement, and ability to read sensitive files.
💻 Affected Systems
- HiNet GPON routers
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could read sensitive configuration files, credentials, or system files, potentially leading to complete device compromise, credential theft, and lateral movement into connected networks.
Likely Case
Attackers scanning for vulnerable devices would read configuration files to extract credentials, network settings, and other sensitive information for further attacks.
If Mitigated
With proper network segmentation and firewall rules blocking port 3097 from untrusted networks, the risk is significantly reduced to internal threats only.
🎯 Exploit Status
The vulnerability requires sending specific commands to port 3097 without authentication. Public references include technical details that could be used to create exploits.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: I040GWR190731 or later
Vendor Advisory: https://www.twcert.org.tw/en/cp-128-3014-904b1-2.html
Restart Required: Yes
Instructions:
1. Check current firmware version. 2. Download firmware version I040GWR190731 or later from vendor. 3. Upload and apply firmware update through device management interface. 4. Reboot device to complete installation.
🔧 Temporary Workarounds
Block port 3097 at firewall
linuxPrevent external access to the vulnerable service by blocking TCP port 3097 at network perimeter firewalls.
iptables -A INPUT -p tcp --dport 3097 -j DROP
Network segmentation
allIsolate GPON devices in separate network segments with restricted access to management interfaces.
🧯 If You Can't Patch
- Implement strict firewall rules to block all inbound traffic to port 3097 from untrusted networks
- Monitor network traffic to port 3097 for suspicious activity and implement intrusion detection
🔍 How to Verify
Check if Vulnerable:
Check if device responds to specific commands on port 3097 that request file reads, or check firmware version against vulnerable range.
Check Version:
Check through device web interface or console: typically in System > Firmware or similar menu
Verify Fix Applied:
Verify firmware version is I040GWR190731 or later through device management interface, and test that file read commands on port 3097 no longer work.
📡 Detection & Monitoring
Log Indicators:
- Unusual connections to port 3097
- Multiple file access attempts from single source
Network Indicators:
- Traffic to port 3097 from external IPs
- Specific command patterns in payloads to port 3097
SIEM Query:
source_port=3097 AND (payload_contains="file_read" OR payload_contains="../")