CVE-2021-46424
📋 TL;DR
CVE-2021-46424 is an arbitrary file deletion vulnerability in Telesquare TLR-2005KSH routers that allows remote attackers to delete any file on the system, including critical system files, via a crafted DELETE request. This affects Telesquare TLR-2005KSH version 1.0.0. Organizations using these routers are vulnerable to complete system compromise.
💻 Affected Systems
- Telesquare TLR-2005KSH
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise leading to device bricking, data destruction, and potential lateral movement to connected networks.
Likely Case
Service disruption, data loss, and potential privilege escalation by deleting critical system files.
If Mitigated
Limited impact if device is behind strict network controls and file deletion attempts are blocked.
🎯 Exploit Status
Simple HTTP DELETE request with file path parameter. Public exploit code available in references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None found
Restart Required: No
Instructions:
No official patch available. Consider replacing affected devices or implementing strict network controls.
🔧 Temporary Workarounds
Network Access Control
linuxBlock all HTTP DELETE requests to affected devices at network perimeter.
iptables -A INPUT -p tcp --dport 80 -m string --string "DELETE" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string "DELETE" --algo bm -j DROP
Web Application Firewall Rules
allConfigure WAF to block DELETE requests containing file paths.
🧯 If You Can't Patch
- Isolate affected devices in separate VLAN with strict access controls
- Implement network monitoring for DELETE requests to device IPs
🔍 How to Verify
Check if Vulnerable:
Send HTTP DELETE request to device with file path parameter and check response. Use curl: curl -X DELETE http://device-ip/path/to/testfile
Check Version:
Check web interface or use nmap: nmap -sV -p 80,443 device-ip
Verify Fix Applied:
Test same DELETE request after implementing controls - should be blocked or return error.
📡 Detection & Monitoring
Log Indicators:
- HTTP DELETE requests in web server logs
- File deletion events in system logs
Network Indicators:
- HTTP DELETE packets to router IP on port 80/443
- Unusual file system access patterns
SIEM Query:
source="router-logs" method="DELETE" OR "file deletion" OR "unlink"
🔗 References
- http://packetstormsecurity.com/files/167127/TLR-2005KSH-Arbitrary-File-Delete.html
- https://drive.google.com/drive/folders/1_e3eJ8fzhCWnCkoRpbLoyQecuKkPR4OD?usp=sharing
- http://packetstormsecurity.com/files/167127/TLR-2005KSH-Arbitrary-File-Delete.html
- https://drive.google.com/drive/folders/1_e3eJ8fzhCWnCkoRpbLoyQecuKkPR4OD?usp=sharing