CVE-2022-26995

9.8 CRITICAL

📋 TL;DR

CVE-2022-26995 is a critical command injection vulnerability in Arris TR3300 routers that allows attackers to execute arbitrary system commands via crafted HTTP requests to the PPTP configuration page. This affects Arris TR3300 router users running vulnerable firmware, potentially allowing complete device compromise. Attackers can gain full control over the router without authentication.

💻 Affected Systems

Products:
  • Arris TR3300
Versions: v1.0.13 and likely earlier versions
Operating Systems: Embedded Linux firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface's PPTP configuration page. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router takeover leading to network compromise, credential theft, man-in-the-middle attacks, and persistent backdoor installation.

🟠

Likely Case

Router compromise allowing network traffic interception, DNS hijacking, and lateral movement to connected devices.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted WAN access and regular patching.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices directly accessible from WAN.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they gain network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires sending crafted HTTP POST requests to wan_pptp.html endpoint with malicious parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.0.14 or later

Vendor Advisory: https://www.arris.com/support/security-advisories/

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to firmware update section. 3. Check for updates. 4. Install latest firmware. 5. Reboot router.

🔧 Temporary Workarounds

Disable remote management

all

Disable WAN access to router management interface

Navigate to Management > Access Control > Remote Management and disable

Block PPTP configuration access

linux

Use firewall rules to block access to wan_pptp.html endpoint

iptables -A INPUT -p tcp --dport 80 -m string --string "wan_pptp.html" --algo bm -j DROP

🧯 If You Can't Patch

  • Isolate router on separate VLAN with strict firewall rules
  • Implement network monitoring for suspicious HTTP requests to router management interface

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under Status > Device Info

Check Version:

curl -s http://router-ip/status_deviceinfo.htm | grep Firmware

Verify Fix Applied:

Verify firmware version is v1.0.14 or later and test PPTP configuration page functionality

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to wan_pptp.html with unusual parameter values
  • System command execution in router logs
  • Unusual process creation

Network Indicators:

  • Unusual outbound connections from router
  • DNS queries to suspicious domains from router
  • Unexpected port openings

SIEM Query:

source="router.log" AND (uri="*wan_pptp.html*" AND (param="*pptp_fix_ip*" OR param="*pptp_fix_mask*" OR param="*pptp_fix_gw*" OR param="*wan_dns1_stat*"))

🔗 References

📤 Share & Export