CVE-2021-27147

9.8 CRITICAL

📋 TL;DR

FiberHome HG6245D devices contain hardcoded admin/admin credentials in their web daemon, allowing attackers to gain administrative access to the device. This affects all users of FiberHome HG6245D devices through firmware version RP2613. The vulnerability is particularly dangerous because it provides complete control over the device.

💻 Affected Systems

Products:
  • FiberHome HG6245D
Versions: through RP2613
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with the vulnerable firmware are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over the device, enabling them to reconfigure network settings, intercept traffic, install malware, or use the device as a pivot point into the internal network.

🟠

Likely Case

Attackers use the credentials to log into the web interface, change device settings, and potentially disrupt network connectivity or monitor user traffic.

🟢

If Mitigated

If devices are behind firewalls with strict access controls and network segmentation, the risk is reduced but not eliminated for internal threats.

🌐 Internet-Facing: HIGH - Devices exposed to the internet can be directly attacked by anyone with network access to the device.
🏢 Internal Only: HIGH - Even internally, any user or compromised system on the same network can exploit these credentials.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only web browser access to the device's management interface and knowledge of the hardcoded credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not publicly available

Restart Required: No

Instructions:

Contact FiberHome for firmware updates. Check with your ISP for patched firmware versions.

🔧 Temporary Workarounds

Network Access Control

all

Restrict access to the device's management interface using firewall rules and network segmentation.

Change Default Credentials

all

If the device allows credential changes, immediately change the admin password to a strong, unique value.

🧯 If You Can't Patch

  • Isolate the device on a separate VLAN with strict access controls
  • Monitor network traffic to/from the device for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Attempt to log into the device's web interface using admin/admin credentials. If successful, the device is vulnerable.

Check Version:

Check firmware version in device web interface or via SSH/Telnet if available

Verify Fix Applied:

Verify that admin/admin credentials no longer work and that a custom password is required.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login with admin/admin
  • Configuration changes from unknown IP addresses

Network Indicators:

  • HTTP requests to device management interface from unexpected sources
  • Unusual outbound traffic from the device

SIEM Query:

source_ip="device_ip" AND (http_method="POST" AND uri="/login.cgi" AND response_code=200) OR (event_type="authentication_success" AND username="admin")

🔗 References

📤 Share & Export