CVE-2023-0861

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated users of NetModule NSRW web administration interface to execute arbitrary operating system commands with elevated privileges by injecting unsanitized input. It affects NetModule NSRW routers running vulnerable firmware versions. Attackers could gain complete control of affected devices.

💻 Affected Systems

Products:
  • NetModule NSRW routers
Versions: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103
Operating Systems: NetModule firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to web administration interface. All devices running affected firmware versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing persistent backdoor installation, network pivoting, data exfiltration, and use in botnets or ransomware attacks.

🟠

Likely Case

Authenticated attackers gaining root access to manipulate device configuration, intercept traffic, or use device as foothold for lateral movement.

🟢

If Mitigated

Limited to authenticated users only, with proper network segmentation preventing lateral movement and command execution monitoring detecting exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but command injection vulnerabilities are typically straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.3.0.119, 4.4.0.118, 4.6.0.105, 4.7.0.103 or later

Vendor Advisory: https://share.netmodule.com/public/system-software/4.7/4.7.0.103/NRSW-RN-4.7.0.103.pdf

Restart Required: Yes

Instructions:

1. Download latest firmware from NetModule support portal. 2. Backup current configuration. 3. Upload and install firmware update via web interface. 4. Reboot device. 5. Verify version is patched.

🔧 Temporary Workarounds

Restrict web interface access

all

Limit access to administration interface to trusted IP addresses only

Configure firewall rules to restrict access to port 80/443 to management network only

Disable web interface if not needed

all

Temporarily disable web administration interface if CLI or other management methods are available

Disable HTTP/HTTPS services in device configuration

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices from critical systems
  • Enable detailed logging and monitoring for command execution attempts and unusual administrative activity

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface (System > About) or CLI command 'show version'

Check Version:

show version

Verify Fix Applied:

Verify firmware version is 4.3.0.119, 4.4.0.118, 4.6.0.105, 4.7.0.103 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts followed by successful login
  • Administrative actions from unexpected IP addresses

Network Indicators:

  • Unusual outbound connections from router
  • Traffic patterns inconsistent with normal operation

SIEM Query:

source="netmodule-router" AND (event_type="command_execution" OR user="admin" AND action="system_command")

🔗 References

📤 Share & Export