CVE-2021-47741

7.5 HIGH

📋 TL;DR

This vulnerability allows limited administrative users on ZBL EPON ONU Broadband Router V100R001 to escalate privileges by accessing configuration endpoints. Attackers can obtain the super user password via configuration backup or password pages, gaining full administrative control. Organizations using these routers are affected.

💻 Affected Systems

Products:
  • ZBL EPON ONU Broadband Router
Versions: V100R001
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects routers with multiple administrative user accounts where limited privilege users exist.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full router compromise allowing attacker to reconfigure network settings, intercept traffic, disable security features, and potentially pivot to internal networks.

🟠

Likely Case

Unauthorized administrative access leading to network configuration changes, service disruption, and credential theft.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent unauthorized users from reaching router management interfaces.

🌐 Internet-Facing: HIGH if router management interface is exposed to internet, as attackers could gain full control remotely.
🏢 Internal Only: HIGH as any user with limited admin access can escalate to full privileges, compromising internal network security.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires existing limited administrative access. Public exploit code available on Exploit-DB.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No vendor advisory found

Restart Required: No

Instructions:

No official patch available. Check vendor website for firmware updates.

🔧 Temporary Workarounds

Restrict Access to Configuration Endpoints

all

Block access to configuration backup and password pages for limited admin users

Configure router ACL to deny limited users access to /config/backup and /password endpoints

Single Admin Account

all

Remove limited privilege accounts and use only single super admin account

Delete all limited admin accounts via router admin interface

🧯 If You Can't Patch

  • Segment router management interface to isolated VLAN accessible only to trusted administrators
  • Implement network monitoring for unusual configuration changes or backup requests

🔍 How to Verify

Check if Vulnerable:

Test if limited admin user can access /config/backup or /password endpoints and retrieve super user credentials

Check Version:

Check router web interface or CLI for firmware version (should show V100R001 if vulnerable)

Verify Fix Applied:

Verify limited admin users cannot access configuration endpoints or retrieve super user passwords

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by configuration backup requests
  • Unusual admin account activity from limited privilege users

Network Indicators:

  • HTTP requests to /config/backup or /password endpoints from non-super-admin accounts

SIEM Query:

source="router_logs" AND (uri="/config/backup" OR uri="/password") AND user!="superadmin"

🔗 References

📤 Share & Export