CVE-2019-25470

7.5 HIGH

📋 TL;DR

This authentication bypass vulnerability in eWON industrial routers allows attackers with minimal privileges to retrieve and decrypt all user passwords. Attackers can exploit the wsdReadForm endpoint to extract sensitive credentials, potentially gaining full administrative access. Organizations using eWON firmware versions 12.2 through 13.0 are affected.

💻 Affected Systems

Products:
  • eWON industrial routers and gateways
Versions: 12.2 to 13.0
Operating Systems: eWON proprietary firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected firmware versions are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems, unauthorized access to critical infrastructure, data exfiltration, and potential physical damage to industrial processes.

🟠

Likely Case

Attackers gain administrative access to eWON devices, allowing them to modify configurations, intercept network traffic, and pivot to other industrial systems.

🟢

If Mitigated

Limited to credential exposure without lateral movement if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: HIGH - eWON devices are often exposed to the internet for remote management, making them prime targets for exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this to escalate privileges and move laterally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires minimal privileges and uses simple HTTP POST requests with base64 encoding. Public exploit code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 13.0s or later

Vendor Advisory: https://www.ewon.biz

Restart Required: Yes

Instructions:

1. Download latest firmware from eWON support portal. 2. Backup current configuration. 3. Upload and install new firmware via web interface. 4. Reboot device. 5. Verify firmware version is 13.0s or higher.

🔧 Temporary Workarounds

Network Access Control

linux

Restrict access to eWON web interface to trusted IP addresses only

iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

Disable Unused Accounts

all

Remove or disable all non-essential user accounts to limit credential exposure

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate eWON devices from critical systems
  • Enable multi-factor authentication if supported and monitor for suspicious authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface at System > About. If version is between 12.2 and 13.0 inclusive, device is vulnerable.

Check Version:

curl -k https://<device_ip>/cgi-bin/status | grep Firmware

Verify Fix Applied:

Verify firmware version is 13.0s or higher. Test that POST requests to /wrcgi.bin/wsdReadForm no longer return encrypted passwords.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /wrcgi.bin/wsdReadForm
  • Unusual authentication patterns or privilege escalation

Network Indicators:

  • HTTP POST requests with base64-encoded credentials to wsdReadForm endpoint
  • Unusual outbound connections from eWON devices

SIEM Query:

source="ewon_logs" AND (uri="/wrcgi.bin/wsdReadForm" OR method="POST" AND uri CONTAINS "wsdReadForm")

🔗 References

📤 Share & Export