CVE-2023-0862

7.2 HIGH

📋 TL;DR

Authenticated users can exploit path traversal vulnerabilities in NetModule NSRW web administration interface to upload malicious files to the web root directory, leading to remote command execution with elevated privileges. This affects NSRW devices running vulnerable firmware versions. Attackers could gain full control of affected devices.

💻 Affected Systems

Products:
  • NetModule NSRW
Versions: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web administration interface. All devices with vulnerable firmware are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise with administrative privileges, allowing attackers to steal credentials, pivot to internal networks, deploy ransomware, or create persistent backdoors.

🟠

Likely Case

Attackers gain shell access to the device, enabling data exfiltration, network reconnaissance, and lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent authenticated attackers from reaching the interface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained. Path traversal to arbitrary file upload is a well-understood attack pattern.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.3.0.119, 4.4.0.118, 4.6.0.105, 4.7.0.103

Vendor Advisory: https://share.netmodule.com/public/system-software/4.7/4.7.0.103/NRSW-RN-4.7.0.103.pdf

Restart Required: Yes

Instructions:

1. Download the appropriate patched firmware version from NetModule's support portal. 2. Backup current configuration. 3. Upload and install the firmware update via the web interface. 4. Reboot the device. 5. Verify the new firmware version is running.

🔧 Temporary Workarounds

Restrict Web Interface Access

linux

Limit access to the web administration interface to trusted IP addresses only using firewall rules.

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Disable Web Interface

linux

Temporarily disable the web administration interface if remote management is not required.

systemctl stop httpd
systemctl disable httpd

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate NSRW devices from critical networks.
  • Enforce strong authentication policies and monitor for suspicious login attempts to the web interface.

🔍 How to Verify

Check if Vulnerable:

Check the firmware version in the web interface under System > Information. Compare against affected version ranges.

Check Version:

curl -k https://DEVICE_IP/api/system/info | grep version

Verify Fix Applied:

Verify the firmware version matches or exceeds the patched versions: 4.3.0.119, 4.4.0.118, 4.6.0.105, or 4.7.0.103.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload activity in web server logs
  • Multiple failed authentication attempts followed by successful login
  • Suspicious POST requests to file upload endpoints with path traversal patterns

Network Indicators:

  • Unexpected outbound connections from NSRW devices
  • Traffic to known malicious IPs or domains

SIEM Query:

source="nsrw_web_logs" AND (uri="*../*" OR method="POST" AND uri="*/upload*" AND status=200)

🔗 References

📤 Share & Export