CVE-2022-30924

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on H3C Magic R100 routers via a stack overflow in the SetAPWifiorLedInfoById parameter. Attackers can exploit this without authentication by sending specially crafted requests to the vulnerable endpoint. All users of affected H3C Magic R100 routers are at risk.

💻 Affected Systems

Products:
  • H3C Magic R100
Versions: R100V100R005
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the web management interface which is typically enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to install persistent malware, intercept all network traffic, pivot to internal networks, and use the device as part of a botnet.

🟠

Likely Case

Remote code execution leading to device takeover, credential theft, and network surveillance capabilities.

🟢

If Mitigated

Limited impact if device is behind strict network segmentation with no internet exposure and all management interfaces are disabled.

🌐 Internet-Facing: HIGH - The vulnerable endpoint is accessible via web interface and can be exploited remotely without authentication.
🏢 Internal Only: HIGH - Even internally, the vulnerability can be exploited by any network-adjacent attacker to compromise the router.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code exists in GitHub repositories, making exploitation straightforward for attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not publicly available

Restart Required: Yes

Instructions:

1. Check H3C official website for firmware updates
2. Download latest firmware for Magic R100
3. Access router web interface
4. Navigate to firmware upgrade section
5. Upload and apply new firmware
6. Reboot router after update

🔧 Temporary Workarounds

Disable Web Management Interface

all

Disable the vulnerable web interface to prevent exploitation

Access router CLI via SSH/Telnet
Enter configuration mode
Disable web management service

Network Segmentation

all

Isolate router management interface from untrusted networks

Configure firewall rules to block external access to port 80/443
Restrict management access to specific IP addresses only

🧯 If You Can't Patch

  • Replace affected devices with updated models or different vendors
  • Implement strict network access controls and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface at System Status > Firmware Version

Check Version:

curl -s http://router-ip/status.cgi | grep Firmware

Verify Fix Applied:

Verify firmware version is newer than R100V100R005 and test if /goform/aspForm endpoint still accepts SetAPWifiorLedInfoById parameter

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/aspForm
  • Large payloads sent to SetAPWifiorLedInfoById parameter
  • Multiple failed authentication attempts followed by successful exploitation

Network Indicators:

  • HTTP POST requests to /goform/aspForm with abnormal payload sizes
  • Traffic patterns indicating reverse shell connections from router

SIEM Query:

source="router-logs" AND (uri="/goform/aspForm" OR parameter="SetAPWifiorLedInfoById") AND bytes_sent>1000

🔗 References

📤 Share & Export