CVE-2022-30105

9.8 CRITICAL

📋 TL;DR

Belkin N300 routers running firmware version 1.00.08 contain multiple remote command injection vulnerabilities in the /setting_hidden.asp script. Attackers can execute arbitrary OS commands with root privileges by sending specially crafted POST requests to vulnerable parameters. All users of affected Belkin N300 routers are at risk.

💻 Affected Systems

Products:
  • Belkin N300 Wireless Router
Versions: Firmware version 1.00.08
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration. The /setting_hidden.asp script is accessible both before and after device configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to install persistent malware, intercept all network traffic, pivot to internal networks, or brick the device.

🟠

Likely Case

Router takeover enabling traffic interception, DNS hijacking, credential theft, and lateral movement to connected devices.

🟢

If Mitigated

Limited impact if device is behind firewall with strict inbound rules and network segmentation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices directly accessible from WAN interfaces.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they gain network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a single POST request with crafted parameters. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Check Belkin website for firmware updates. If unavailable, replace device or implement workarounds.

🔧 Temporary Workarounds

Network Isolation

all

Place router behind firewall with strict inbound rules blocking all WAN access to web interface

Access Restriction

all

Configure firewall to only allow web interface access from specific management IP addresses

🧯 If You Can't Patch

  • Replace affected Belkin N300 router with a supported, patched model
  • Implement network segmentation to isolate router from critical systems

🔍 How to Verify

Check if Vulnerable:

Check firmware version via router web interface at http://router-ip/ or using nmap scan for device identification

Check Version:

curl -s http://router-ip/ | grep -i firmware || nmap -sV -p80 router-ip

Verify Fix Applied:

Verify firmware version is newer than 1.00.08. No patch verification possible as no fix exists.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /setting_hidden.asp with unusual parameter values
  • System logs showing unexpected command execution

Network Indicators:

  • POST requests to /setting_hidden.asp containing shell metacharacters like ;, |, &, $()
  • Unusual outbound connections from router

SIEM Query:

source="router_logs" AND (url="/setting_hidden.asp" AND method="POST" AND (params CONTAINS ";" OR params CONTAINS "|" OR params CONTAINS "$" OR params CONTAINS "`"))

🔗 References

📤 Share & Export