CVE-2022-25995
📋 TL;DR
CVE-2022-25995 is a command execution vulnerability in the console inhand functionality of InHand Networks InRouter302 devices. Attackers can send specially-crafted network requests to execute arbitrary commands on affected routers. Organizations using InRouter302 V3.5.4 devices are affected.
💻 Affected Systems
- InHand Networks InRouter302
📦 What is this software?
Ir302 Firmware by Inhandnetworks
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the router allowing attackers to pivot to internal networks, intercept traffic, deploy malware, or use the device as a botnet node.
Likely Case
Unauthorized command execution leading to configuration changes, data exfiltration, or denial of service.
If Mitigated
Limited impact if devices are behind firewalls with restricted network access and proper segmentation.
🎯 Exploit Status
The vulnerability requires sending a sequence of network requests but does not require authentication. Public exploit details are available in the Talos report.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: V3.5.5 or later
Vendor Advisory: https://www.inhandnetworks.com/upload/attachment/202205/10/InHand-PSA-2022-01.pdf
Restart Required: Yes
Instructions:
1. Download firmware update from InHand Networks support portal. 2. Log into router web interface. 3. Navigate to System > Upgrade. 4. Upload firmware file. 5. Apply update and reboot router.
🔧 Temporary Workarounds
Network Access Restriction
allRestrict network access to the router's management interface using firewall rules.
Disable Console Inhand
allDisable the vulnerable console inhand functionality if not required.
🧯 If You Can't Patch
- Isolate affected routers in a dedicated network segment with strict access controls.
- Implement network monitoring and intrusion detection for suspicious traffic to router management interfaces.
🔍 How to Verify
Check if Vulnerable:
Check router firmware version via web interface: System > Status. If version is V3.5.4, device is vulnerable.
Check Version:
No CLI command provided by vendor. Use web interface at System > Status.
Verify Fix Applied:
After patching, verify firmware version shows V3.5.5 or later in System > Status.
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution logs in router system logs
- Multiple failed or unusual HTTP requests to management interface
Network Indicators:
- Unusual network traffic patterns to router management ports
- Suspicious sequences of HTTP requests to router IP
SIEM Query:
source="router_logs" AND (event="command_execution" OR event="unauthorized_access")