CVE-2021-30028

7.2 HIGH

📋 TL;DR

SOOTEWAY Wi-Fi Range Extender v1.5 uses default admin credentials for its TELNET service, allowing attackers to remotely access and modify the device firmware. This affects users who haven't changed the default password on these specific range extenders.

💻 Affected Systems

Products:
  • SOOTEWAY Wi-Fi Range Extender
Versions: v1.5
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with TELNET service enabled and default credentials unchanged.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full control of the device, erase or replace firmware with malicious code, create persistent backdoors, and potentially pivot to attack other network devices.

🟠

Likely Case

Attackers access the device via TELNET using default credentials, read sensitive configuration data, and potentially disrupt network connectivity.

🟢

If Mitigated

With proper password management and network segmentation, impact is limited to isolated device compromise without network-wide consequences.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires TELNET access and knowledge of default credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

No official patch available. Change default admin password immediately.

🔧 Temporary Workarounds

Change Default Credentials

all

Change the admin password from default to a strong, unique password.

telnet [device_ip]
login: admin
password: [current_password]
set password [new_password]

Disable TELNET Service

all

Disable TELNET service if not required for device management.

telnet [device_ip]
login: admin
password: [password]
disable telnet

🧯 If You Can't Patch

  • Change default admin password immediately
  • Disable TELNET service if not needed
  • Isolate device on separate VLAN
  • Implement network access controls to restrict TELNET access

🔍 How to Verify

Check if Vulnerable:

Attempt TELNET connection to device on port 23 using default credentials (admin/admin).

Check Version:

Check device web interface or packaging for firmware version.

Verify Fix Applied:

Verify TELNET access is denied with default credentials and new password works.

📡 Detection & Monitoring

Log Indicators:

  • Failed TELNET authentication attempts
  • Successful TELNET logins with default credentials

Network Indicators:

  • TELNET connections to device on port 23
  • Unusual firmware modification traffic

SIEM Query:

source="device_logs" AND (event="TELNET login" AND user="admin")

🔗 References

📤 Share & Export