CVE-2020-15357

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on Askey AP5100W Dual-SIG WiFi mesh access points by injecting shell metacharacters into network diagnostic functions (ping, traceroute, route). Attackers can gain full system control without authentication. All organizations using affected Askey access points are at risk.

💻 Affected Systems

Products:
  • Askey AP5100W Dual-SIG WiFi Mesh Access Point
Versions: All versions up to and including 1.01.097
Operating Systems: Embedded Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerable network analysis functionality is typically accessible via the web management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the access point, allowing attackers to pivot to internal networks, intercept traffic, deploy malware, or create persistent backdoors.

🟠

Likely Case

Attackers gain administrative control of the access point, enabling traffic interception, network disruption, or credential theft from connected devices.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the access point itself without lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the management interface but no authentication. Public technical details exist in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.01.097

Vendor Advisory: https://www.askey.com.tw/incident_report_notifications.html

Restart Required: Yes

Instructions:

1. Check current firmware version. 2. Download latest firmware from Askey support portal. 3. Upload firmware via web interface. 4. Apply update and reboot device.

🔧 Temporary Workarounds

Disable Remote Management

all

Restrict management interface access to trusted internal networks only

Network Segmentation

all

Place access points in isolated VLANs with strict firewall rules

🧯 If You Can't Patch

  • Isolate affected devices in dedicated network segments with strict egress filtering
  • Implement network monitoring for unusual command execution patterns on these devices

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface: Settings > System > Firmware Version. If version is 1.01.097 or earlier, device is vulnerable.

Check Version:

No CLI command available. Use web interface: navigate to System Information page.

Verify Fix Applied:

Verify firmware version is greater than 1.01.097. Test network analysis functions with shell metacharacters to confirm they are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts to management interface
  • Shell command patterns in network diagnostic requests

Network Indicators:

  • Unusual outbound connections from access points
  • Traffic patterns suggesting command and control activity
  • Exploit attempts to network analysis endpoints

SIEM Query:

source="askey-ap5100w" AND (event="command_execution" OR event="shell_metacharacter_detected")

🔗 References

📤 Share & Export