CVE-2023-22922

7.5 HIGH

📋 TL;DR

A buffer overflow vulnerability in Zyxel NBG-418N v2 router firmware allows remote unauthenticated attackers to cause denial-of-service conditions by sending specially crafted packets to Telnet services. This affects users with Telnet enabled on vulnerable firmware versions. The vulnerability requires Telnet to be enabled on the device.

💻 Affected Systems

Products:
  • Zyxel NBG-418N v2
Versions: Firmware versions prior to V1.00(AARP.14)C0
Operating Systems: Embedded router firmware
Default Config Vulnerable: ✅ No
Notes: Telnet is not enabled by default on these devices. Vulnerability only exploitable if Telnet service has been manually enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote unauthenticated attacker could cause permanent device failure requiring physical reset or replacement, potentially disrupting all network connectivity.

🟠

Likely Case

Temporary denial-of-service causing router reboot and network disruption until device restarts.

🟢

If Mitigated

No impact if Telnet is disabled or device is patched.

🌐 Internet-Facing: HIGH if Telnet is exposed to internet, as attack requires no authentication.
🏢 Internal Only: MEDIUM if Telnet is enabled on internal network, as attacker still requires network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires Telnet service to be enabled and accessible. Crafted packets can trigger buffer overflow.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V1.00(AARP.14)C0

Vendor Advisory: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-nbg-418n-v2-home-router

Restart Required: Yes

Instructions:

1. Download firmware V1.00(AARP.14)C0 from Zyxel support site. 2. Log into router web interface. 3. Navigate to Maintenance > Firmware Upgrade. 4. Upload and install the new firmware. 5. Router will reboot automatically.

🔧 Temporary Workarounds

Disable Telnet Service

all

Disable Telnet service on the router to prevent exploitation.

Log into router web interface > Network > Telnet > Disable

Block Telnet Port

linux

Block access to Telnet port (TCP 23) using firewall rules.

iptables -A INPUT -p tcp --dport 23 -j DROP

🧯 If You Can't Patch

  • Disable Telnet service immediately if not required
  • Implement network segmentation to isolate router from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface under Maintenance > System Info. If version is older than V1.00(AARP.14)C0 and Telnet is enabled, device is vulnerable.

Check Version:

telnet [router_ip] 23 (if enabled) or check web interface

Verify Fix Applied:

Verify firmware version shows V1.00(AARP.14)C0 or newer in Maintenance > System Info.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed Telnet connection attempts
  • Router reboot logs without user action
  • Telnet service crash logs

Network Indicators:

  • Unusual traffic to TCP port 23
  • Malformed Telnet packets
  • Router becoming unresponsive

SIEM Query:

source="router_logs" AND ("telnet" OR "reboot") AND NOT user_action="true"

🔗 References

📤 Share & Export