CVE-2022-23332
📋 TL;DR
This CVE describes a command injection vulnerability in the manual ping form of Shenzhen Ejoin Information Technology's ACOM508/ACOM516/ACOM532 devices. Attackers can inject arbitrary commands via the web UI field, potentially gaining remote code execution. Organizations using these specific Ejoin devices are affected.
💻 Affected Systems
- Shenzhen Ejoin Information Technology Co., Ltd. ACOM508
- ACOM516
- ACOM532
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise allowing attacker to execute arbitrary commands with device privileges, potentially leading to data theft, lateral movement, or device takeover.
Likely Case
Remote code execution leading to device compromise, data exfiltration, or use as a foothold in the network.
If Mitigated
Limited impact if proper input validation and network segmentation are implemented, potentially only affecting the web service.
🎯 Exploit Status
Exploit code is publicly available on GitHub, making this easily exploitable.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: http://en.ejointech.com/
Restart Required: No
Instructions:
Check vendor website for security updates. No specific patch information available in public sources.
🔧 Temporary Workarounds
Disable Web UI Ping Function
allDisable or restrict access to the manual ping functionality in the web interface.
Network Segmentation
allIsolate affected devices in separate network segments with strict firewall rules.
🧯 If You Can't Patch
- Implement strict input validation and sanitization for all web UI fields
- Deploy web application firewall (WAF) with command injection rules
🔍 How to Verify
Check if Vulnerable:
Test the manual ping form in the web UI for command injection by attempting to inject shell commands.
Check Version:
Check device firmware version in web UI or via device management interface.
Verify Fix Applied:
Verify that command injection attempts in the ping form are properly sanitized or rejected.
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution in system logs
- Multiple ping attempts with suspicious parameters
Network Indicators:
- Unusual outbound connections from device
- Traffic to unexpected ports
SIEM Query:
source="device_logs" AND ("ping" AND ("|" OR ";" OR "$" OR "`"))
🔗 References
- http://en.ejointech.com/
- https://drive.google.com/drive/folders/1QRs6wos3mL9289TTUm98n5OmgBVrbYTx
- https://github.com/kyl3song/CVE/tree/main/CVE-2022-23332
- http://en.ejointech.com/
- https://drive.google.com/drive/folders/1QRs6wos3mL9289TTUm98n5OmgBVrbYTx
- https://github.com/kyl3song/CVE/tree/main/CVE-2022-23332