CVE-2021-31152
📋 TL;DR
This CSRF vulnerability in Multilaser Router AC1200 firmware allows attackers to trick authenticated users into performing unauthorized actions like enabling remote access or changing passwords. It affects users of this specific router model with vulnerable firmware who access the web interface while authenticated.
💻 Affected Systems
- Multilaser Router RE018 AC1200
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains full administrative control of router, enabling remote access, changing credentials, and potentially intercepting all network traffic.
Likely Case
Attacker enables remote management or changes admin password, gaining persistent access to router configuration.
If Mitigated
Limited impact with proper CSRF protections and network segmentation in place.
🎯 Exploit Status
Exploitation requires victim to be logged into router admin interface and visit malicious site. Proof-of-concept code is publicly available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None found
Restart Required: No
Instructions:
No official patch available. Check vendor website for firmware updates. If unavailable, implement workarounds.
🔧 Temporary Workarounds
Disable Router Web Interface
allPrevent access to vulnerable web interface by disabling HTTP/HTTPS management
Router-specific: Disable remote management in admin interface
Use CLI if available: no ip http server
Use Browser CSRF Protection
allEnable browser extensions that block CSRF requests
Install extensions like CSRF Guard or NoScript
🧯 If You Can't Patch
- Segment router management to isolated VLAN
- Implement strict same-origin policies via reverse proxy
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in admin interface. If version is V02.03.01.45_pt, assume vulnerable.
Check Version:
Login to router web interface and check System Information or Firmware version page.
Verify Fix Applied:
Test CSRF protection by attempting to submit form changes from external domain.
📡 Detection & Monitoring
Log Indicators:
- Multiple configuration changes from same IP in short time
- Remote management enabled unexpectedly
- Admin password change without user action
Network Indicators:
- HTTP POST requests to router admin endpoints with missing/referer headers
- Cross-origin requests to router IP
SIEM Query:
source_ip=router_ip AND (event_type="config_change" OR event_type="password_change") AND referer_header NOT CONTAINS router_ip
🔗 References
- http://packetstormsecurity.com/files/162258/Multilaser-Router-RE018-AC1200-Cross-Site-Request-Forgery.html
- http://seclists.org/fulldisclosure/2024/Mar/1
- https://www.youtube.com/watch?v=zN3DVrcu6Eg
- http://packetstormsecurity.com/files/162258/Multilaser-Router-RE018-AC1200-Cross-Site-Request-Forgery.html
- http://seclists.org/fulldisclosure/2024/Mar/1
- https://www.youtube.com/watch?v=zN3DVrcu6Eg