CVE-2022-45599

9.8 CRITICAL

📋 TL;DR

CVE-2022-45599 is a PHP type juggling vulnerability in Aztech WMB250AC mesh routers that allows attackers to bypass authentication and gain administrative privileges under specific conditions related to password hashes. This affects users of Aztech WMB250AC routers with firmware version 016 2020. The vulnerability resides in the login.php file and enables privilege escalation.

💻 Affected Systems

Products:
  • Aztech WMB250AC Mesh Router
Versions: Firmware Version 016 2020
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires specific conditions related to password hashes, but default configurations may be susceptible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control of the router, allowing them to intercept traffic, modify configurations, install malware, and pivot to internal networks.

🟠

Likely Case

Unauthorized administrative access leading to network compromise, data interception, and potential lateral movement to connected devices.

🟢

If Mitigated

Limited impact if strong network segmentation, monitoring, and access controls prevent exploitation or detect anomalous login attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires knowledge of specific password hash conditions but is technically straightforward once those conditions are met.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider replacing affected hardware or implementing workarounds.

🔧 Temporary Workarounds

Disable Web Management Interface

all

Disable the vulnerable web interface to prevent exploitation attempts.

Check router documentation for disabling web admin interface

Network Segmentation

all

Isolate the router from critical networks to limit potential damage.

Configure firewall rules to restrict access to router management interface

🧯 If You Can't Patch

  • Replace affected routers with updated or different models
  • Implement strict network access controls and monitor for unauthorized login attempts

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface or SSH if available. Vulnerable if running Firmware Version 016 2020.

Check Version:

Check web interface admin panel or use manufacturer-specific CLI commands if available.

Verify Fix Applied:

Verify firmware has been updated to a version beyond 016 2020, though no official patch exists.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful admin login from unusual IPs
  • Unauthorized configuration changes in router logs

Network Indicators:

  • Unusual traffic patterns from router to external IPs
  • Unexpected administrative access attempts to router management interface

SIEM Query:

Example: 'source="router_logs" AND (event="admin_login" OR event="config_change") AND user!="authorized_user"'

🔗 References

📤 Share & Export