CVE-2022-26999

9.8 CRITICAL

📋 TL;DR

The Arris TR3300 router contains a command injection vulnerability in its static IP configuration function. Attackers can execute arbitrary system commands by sending specially crafted requests to the affected parameters. This affects all users running the vulnerable firmware version.

💻 Affected Systems

Products:
  • Arris TR3300
Versions: v1.0.13
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration when static IP settings are accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full router compromise allowing attackers to intercept all network traffic, install persistent backdoors, pivot to internal networks, and potentially brick the device.

🟠

Likely Case

Router takeover enabling traffic interception, DNS hijacking, credential theft, and launching attacks against internal devices.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted WAN access and proper network segmentation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices directly accessible from WAN.
🏢 Internal Only: MEDIUM - Requires attacker to be on local network or have compromised another internal device first.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication to router admin interface. Public proof-of-concept demonstrates command injection.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check vendor website for firmware updates
2. Download latest firmware
3. Access router admin interface
4. Navigate to firmware update section
5. Upload and apply new firmware
6. Reboot router

🔧 Temporary Workarounds

Disable Static IP Configuration

all

Use DHCP instead of static IP configuration to avoid vulnerable function

Restrict Admin Interface Access

all

Limit admin interface access to specific IP addresses or disable remote administration

🧯 If You Can't Patch

  • Replace router with supported model from different vendor
  • Place router behind dedicated firewall with strict inbound rules

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under System Status or About page

Check Version:

Login to router admin interface and navigate to System Information

Verify Fix Applied:

Verify firmware version is newer than v1.0.13 and test static IP configuration functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to static IP configuration endpoints
  • Commands containing shell metacharacters in parameter values
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unusual outbound connections from router
  • DNS queries to suspicious domains
  • Unexpected port scans originating from router

SIEM Query:

source="router_logs" AND (uri_path="/cgi-bin/static_ip.cgi" OR parameters CONTAINS "wan_ip_stat" OR parameters CONTAINS "|" OR parameters CONTAINS ";" OR parameters CONTAINS "`")

🔗 References

📤 Share & Export