CVE-2022-26518

8.8 HIGH

📋 TL;DR

CVE-2022-26518 is an OS command injection vulnerability in InHand Networks InRouter302's console infactory_net functionality that allows remote attackers to execute arbitrary commands on affected devices. This vulnerability affects InRouter302 devices running firmware version V3.5.37, potentially enabling remote code execution without authentication.

💻 Affected Systems

Products:
  • InHand Networks InRouter302
Versions: V3.5.37
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The console infactory_net functionality is part of the device's management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to persistent backdoor installation, network pivoting to internal systems, data exfiltration, and device bricking.

🟠

Likely Case

Remote code execution allowing attacker to modify device configuration, intercept network traffic, or use device as part of botnet.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted inbound access and proper network segmentation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending a specially-crafted sequence of network requests to trigger command injection.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V3.5.45 or later

Vendor Advisory: https://www.inhandnetworks.com/upload/attachment/202205/10/InHand-PSA-2022-01.pdf

Restart Required: Yes

Instructions:

1. Download firmware version V3.5.45 or later from InHand Networks support portal. 2. Log into router web interface. 3. Navigate to System > Firmware Upgrade. 4. Upload new firmware file. 5. Apply upgrade and wait for automatic reboot.

🔧 Temporary Workarounds

Network Access Restriction

linux

Block external access to router management interface using firewall rules.

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Disable Remote Management

all

Turn off remote management features in router configuration.

🧯 If You Can't Patch

  • Isolate affected routers in separate VLAN with strict firewall rules
  • Implement network monitoring for unusual outbound connections from routers

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface: System > Status > Firmware Version. If version is V3.5.37, device is vulnerable.

Check Version:

curl -s http://router-ip/status | grep -i firmware

Verify Fix Applied:

Verify firmware version is V3.5.45 or later after patching.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to console infactory_net endpoints
  • Multiple failed authentication attempts followed by successful access

Network Indicators:

  • Unusual outbound connections from router to external IPs
  • Traffic patterns suggesting command-and-control communication

SIEM Query:

source="router_logs" AND (uri="/console/infactory_net" OR cmd="*;*" OR cmd="*|*")

🔗 References

📤 Share & Export