CVE-2020-14111

7.8 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in Xiaomi Router AX3600 firmware that allows attackers to execute arbitrary code on affected devices. The vulnerability stems from insufficient input validation of incoming data. All users of vulnerable Xiaomi Router AX3600 devices are affected.

💻 Affected Systems

Products:
  • Xiaomi Router AX3600
Versions: Firmware versions before the patched release
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected firmware versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing attackers to intercept all network traffic, install persistent malware, pivot to internal networks, and use the device for botnet activities.

🟠

Likely Case

Attackers gain shell access to the router, modify DNS settings, intercept credentials, and potentially compromise connected devices.

🟢

If Mitigated

With proper network segmentation and firewall rules, impact is limited to the router itself without lateral movement to other systems.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices directly accessible from the internet.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they gain network access, but external exploitation is more likely.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Command injection vulnerabilities typically have low exploitation complexity. Public advisories suggest exploitation is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Xiaomi security advisory for specific patched firmware version

Vendor Advisory: https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=18

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Check for firmware updates. 3. Apply latest firmware update from Xiaomi. 4. Reboot router after update completes.

🔧 Temporary Workarounds

Network Isolation

all

Place router in isolated network segment with strict firewall rules limiting inbound access

Disable Remote Management

all

Turn off remote administration features if not required

🧯 If You Can't Patch

  • Replace vulnerable router with patched or alternative device
  • Implement strict network monitoring and intrusion detection for router traffic

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface and compare against patched version in Xiaomi advisory

Check Version:

Check via router web interface or SSH if available: cat /etc/mi_release or similar version file

Verify Fix Applied:

Confirm firmware version matches or exceeds patched version listed in Xiaomi security advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in router logs
  • Unexpected process creation
  • Suspicious network configuration changes

Network Indicators:

  • Unusual outbound connections from router
  • DNS hijacking patterns
  • Unexpected port scanning from router

SIEM Query:

Example: source="router_logs" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*")

🔗 References

📤 Share & Export