CVE-2020-14094

9.8 CRITICAL

📋 TL;DR

This vulnerability in Xiaomi R3600 routers allows attackers to inject malicious code through the web interface, leading to stack overflow and potential remote code execution. It affects users with ROM versions below 1.0.20. Attackers could gain full control of affected routers.

💻 Affected Systems

Products:
  • Xiaomi Router R3600
Versions: ROM versions < 1.0.20
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. Web interface must be accessible for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router compromise allowing attacker to intercept all network traffic, install persistent malware, pivot to internal networks, and use router as botnet node.

🟠

Likely Case

Router takeover enabling traffic monitoring, DNS hijacking, credential theft, and lateral movement to connected devices.

🟢

If Mitigated

Limited impact if router is isolated from critical networks and has strict firewall rules, though still vulnerable to local network attacks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires web interface access but no authentication. CVSS 9.8 indicates trivial exploitation with high impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ROM version 1.0.20 or later

Vendor Advisory: https://privacy.mi.com/trust#/security/vulnerability-management/vulnerability-announcement/detail?id=17

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to System Update. 3. Check for updates. 4. Install ROM version 1.0.20 or later. 5. Reboot router after update completes.

🔧 Temporary Workarounds

Disable Web Interface Access

linux

Block external access to router web interface

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Network Segmentation

all

Isolate router on separate VLAN from critical systems

🧯 If You Can't Patch

  • Disable remote administration and restrict web interface to local network only
  • Implement strict firewall rules to limit router communication to only necessary services

🔍 How to Verify

Check if Vulnerable:

Check router admin interface for ROM version. If version is below 1.0.20, system is vulnerable.

Check Version:

Login to router web interface and check System Status or About page for ROM version

Verify Fix Applied:

Confirm ROM version is 1.0.20 or higher in router admin interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual web interface access patterns
  • Multiple failed injection attempts
  • Unexpected process execution

Network Indicators:

  • Unusual outbound connections from router
  • DNS queries to suspicious domains
  • Traffic redirection patterns

SIEM Query:

source="router_logs" AND (message="*injection*" OR message="*overflow*" OR message="*unauthorized*access*")

🔗 References

📤 Share & Export