CVE-2022-43391

6.5 MEDIUM

📋 TL;DR

A buffer overflow vulnerability in the CGI program of Zyxel NR7101 firmware allows authenticated attackers to cause denial-of-service conditions by sending specially crafted HTTP requests. This affects Zyxel NR7101 devices running firmware versions prior to V1.15(ACCC.3)C0. The vulnerability requires authentication but could disrupt network connectivity for affected devices.

💻 Affected Systems

Products:
  • Zyxel NR7101
Versions: All firmware versions prior to V1.15(ACCC.3)C0
Operating Systems: Embedded Linux (Zyxel firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web management interface. Default credentials may increase risk if not changed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device crash requiring physical reboot, extended network downtime, and potential for remote code execution if the buffer overflow can be leveraged beyond DoS.

🟠

Likely Case

Temporary denial-of-service causing device reboot or service interruption, disrupting network connectivity for connected users.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting authenticated access to vulnerable interfaces.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the web interface. The buffer overflow is in CGI parameter handling.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V1.15(ACCC.3)C0

Vendor Advisory: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-buffer-overflow-vulnerabilities-of-cpe-fiber-onts-and-wifi-extenders

Restart Required: Yes

Instructions:

1. Download firmware V1.15(ACCC.3)C0 from Zyxel support portal. 2. Log into NR7101 web interface. 3. Navigate to Maintenance > Firmware Upgrade. 4. Upload the firmware file. 5. Wait for upgrade to complete and device to reboot.

🔧 Temporary Workarounds

Restrict Web Interface Access

all

Limit access to the NR7101 web management interface to trusted IP addresses only.

Configure firewall rules to restrict access to port 80/443 on NR7101 to specific management IPs

Disable Remote Management

all

Disable remote web management if not required, forcing local network access only.

In NR7101 web interface: System > Remote Management > Disable

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate NR7101 devices from untrusted networks
  • Change default credentials and implement strong authentication policies for device management

🔍 How to Verify

Check if Vulnerable:

Check firmware version in NR7101 web interface under System > System Info. If version is earlier than V1.15(ACCC.3)C0, device is vulnerable.

Check Version:

curl -k https://[device-ip]/cgi-bin/luci/; show version in web interface

Verify Fix Applied:

After patching, verify firmware version shows V1.15(ACCC.3)C0 or later in System > System Info.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by large HTTP requests to CGI endpoints
  • Device reboot logs without normal shutdown sequence

Network Indicators:

  • Unusually large HTTP POST requests to /cgi-bin/ endpoints
  • Sudden loss of connectivity to NR7101 device

SIEM Query:

source="nr7101-logs" AND (uri_path="/cgi-bin/*" AND content_length>10000) OR event_type="device_reboot"

🔗 References

📤 Share & Export