CVE-2023-22919

8.8 HIGH

📋 TL;DR

This is a post-authentication command injection vulnerability in Zyxel NBG6604 home routers. An authenticated attacker can execute arbitrary OS commands by sending specially crafted HTTP requests. Only users with NBG6604 routers running the vulnerable firmware are affected.

💻 Affected Systems

Products:
  • Zyxel NBG6604
Versions: V1.01(ABIR.0)C0
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have valid administrative credentials. Default admin credentials increase risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing attacker to intercept all network traffic, install persistent malware, pivot to internal network devices, and potentially brick the device.

🟠

Likely Case

Attacker with valid credentials gains full control of router, enabling traffic monitoring, DNS hijacking, and credential theft from connected devices.

🟢

If Mitigated

With strong authentication and network segmentation, impact limited to router compromise without lateral movement to other systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid admin credentials but command injection is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V1.01(ABIR.1)C0 or later

Vendor Advisory: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-command-injection-vulnerability-in-nbg6604-home-router

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to firmware update section. 3. Download latest firmware from Zyxel support site. 4. Upload and apply firmware update. 5. Reboot router.

🔧 Temporary Workarounds

Change default credentials

all

Change default admin password to strong, unique password

Disable remote admin access

all

Disable WAN-side administrative access to router

🧯 If You Can't Patch

  • Isolate router on separate VLAN with strict firewall rules
  • Implement network monitoring for suspicious HTTP requests to router admin interface

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under System Status or Maintenance section

Check Version:

Check via web interface: http://router-ip/ or via SSH if enabled

Verify Fix Applied:

Verify firmware version shows V1.01(ABIR.1)C0 or later after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to admin endpoints
  • Multiple failed login attempts followed by successful login

Network Indicators:

  • HTTP requests containing shell metacharacters like ;, |, &, $()
  • Unusual outbound connections from router

SIEM Query:

source="router" AND (http_method="POST" AND uri="/cgi-bin/*" AND (content="*;*" OR content="*|*" OR content="*$(*"))

🔗 References

📤 Share & Export