CVE-2020-27689
📋 TL;DR
The Relish VH510 4G hub contains hardcoded admin credentials in firmware versions before 1.0.1.6L0516, allowing remote attackers to gain administrative access to the web interface. This enables complete device compromise including command execution and firmware replacement with malicious versions. All users of affected VH510 devices with vulnerable firmware are impacted.
💻 Affected Systems
- Relish (Verve Connect) VH510 4G Hub
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device takeover allowing attacker to install malicious firmware, intercept all network traffic, use device as pivot point into internal networks, and maintain persistent access.
Likely Case
Unauthorized administrative access leading to device configuration changes, network disruption, and potential credential harvesting from connected devices.
If Mitigated
Limited impact if device is behind firewall with no external web interface access and strong network segmentation.
🎯 Exploit Status
Exploitation requires only knowledge of default credentials and access to web interface. Full disclosure includes technical details.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.0.1.6L0516 or later
Vendor Advisory: https://6point6.co.uk/insights/security-advisory-relish-4g-hub-vh510/
Restart Required: Yes
Instructions:
1. Log into VH510 web interface. 2. Navigate to System > Firmware Update. 3. Upload firmware version 1.0.1.6L0516 or later. 4. Apply update and allow device to reboot. 5. Verify firmware version after reboot.
🔧 Temporary Workarounds
Network Access Restriction
allBlock external access to VH510 web management interface using firewall rules
Credential Change
allChange default admin credentials if device allows credential modification
🧯 If You Can't Patch
- Isolate VH510 device on separate VLAN with strict firewall rules preventing external and internal access to management interface
- Disable remote management features and ensure web interface is only accessible from trusted management network
🔍 How to Verify
Check if Vulnerable:
Check firmware version in web interface under System > Status. If version is earlier than 1.0.1.6L0516, device is vulnerable.
Check Version:
No CLI command available. Must check via web interface at System > Status page.
Verify Fix Applied:
After update, verify firmware version shows 1.0.1.6L0516 or later in System > Status. Attempt to login with default credentials should fail.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts followed by successful admin login
- Firmware update events from unexpected sources
- Configuration changes from unknown IP addresses
Network Indicators:
- HTTP requests to /cgi-bin/luci on port 80/443 from external IPs
- Unusual outbound connections from VH510 device
SIEM Query:
source_ip="VH510_IP" AND (http_uri="/cgi-bin/luci" OR event_type="login_success" AND user="admin")
🔗 References
- https://6point6.co.uk/insights/security-advisory-relish-4g-hub-vh510/
- https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf
- https://6point6.co.uk/insights/security-advisory-relish-4g-hub-vh510/
- https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf