CVE-2023-1162
📋 TL;DR
This is a critical command injection vulnerability in DrayTek Vigor 2960 routers that allows attackers to execute arbitrary commands on the device by manipulating the password parameter in the web management interface. Attackers can exploit this remotely without authentication to gain full control of affected routers. Only products no longer supported by the maintainer are affected.
💻 Affected Systems
- DrayTek Vigor 2960
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the router allowing attackers to intercept all network traffic, install persistent backdoors, pivot to internal networks, and use the device for further attacks.
Likely Case
Router takeover leading to network monitoring, credential theft, and potential lateral movement into connected systems.
If Mitigated
Limited impact if the router is behind firewalls with strict inbound rules and network segmentation prevents lateral movement.
🎯 Exploit Status
Exploit code is publicly available on GitHub. The vulnerability requires no authentication and has simple exploitation vectors.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: N/A
Vendor Advisory: N/A
Restart Required: No
Instructions:
No official patch available as this affects unsupported products. Consider upgrading to supported hardware.
🔧 Temporary Workarounds
Disable Web Management Interface
allDisable the vulnerable web interface completely to prevent exploitation.
Access router CLI via SSH/Telnet and disable web management interface (specific commands vary by configuration)
Restrict Management Interface Access
allLimit access to the web management interface to trusted IP addresses only.
Configure firewall rules to restrict access to router management IP/port from specific source IPs
🧯 If You Can't Patch
- Replace affected routers with supported models that receive security updates
- Implement network segmentation to isolate vulnerable routers from critical systems
🔍 How to Verify
Check if Vulnerable:
Check router firmware version via web interface at System Maintenance > System Information or via CLI command 'show version'
Check Version:
ssh admin@router_ip 'show version' or check web interface System Information page
Verify Fix Applied:
Since no patch exists, verify workarounds by testing that web interface is inaccessible or restricted to authorized IPs only
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution in router logs
- Multiple failed login attempts followed by successful access
- Unexpected configuration changes
Network Indicators:
- Unusual outbound connections from router
- Traffic to known malicious IPs from router
- Unexpected port scans originating from router
SIEM Query:
source="router_logs" AND ("command injection" OR "mainfunction.cgi" OR suspicious shell commands)