CVE-2023-27217

9.8 CRITICAL

📋 TL;DR

A stack-based buffer overflow vulnerability in Belkin Smart Outlet V2's ChangeFriendlyName() function allows attackers to cause Denial of Service via crafted UPnP requests. This affects Belkin Smart Outlet V2 devices with vulnerable firmware, potentially disrupting smart home operations.

💻 Affected Systems

Products:
  • Belkin Smart Outlet V2 F7c063
Versions: firmware_2.00.11420.OWRT.PVT_SNSV2
Operating Systems: Embedded OpenWRT
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default UPnP service configuration; devices exposed to local network are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device crash requiring physical reset, potential remote code execution if combined with other vulnerabilities, and persistent denial of service affecting connected devices.

🟠

Likely Case

Device becomes unresponsive, requiring manual power cycle or factory reset, disrupting smart home automation and connected appliances.

🟢

If Mitigated

Limited to temporary service interruption if network segmentation prevents UPnP access from untrusted networks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted UPnP request to vulnerable device; no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available from Belkin. Check manufacturer website for firmware updates.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate IoT devices on separate VLAN to prevent UPnP access from untrusted networks.

Disable UPnP

all

Disable UPnP service on router/network if device functionality doesn't require it.

🧯 If You Can't Patch

  • Physically disconnect device from network if not essential
  • Implement strict firewall rules blocking UPnP traffic (port 1900/udp) to IoT devices

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via Belkin app or web interface; version 2.00.11420.OWRT.PVT_SNSV2 is vulnerable.

Check Version:

Check via Belkin app or device web interface; no universal CLI command available.

Verify Fix Applied:

Verify firmware has been updated to version newer than 2.00.11420.OWRT.PVT_SNSV2.

📡 Detection & Monitoring

Log Indicators:

  • Device crash logs
  • UPnP service restart events
  • Unusual UPnP request patterns

Network Indicators:

  • Malformed UPnP packets to port 1900/udp
  • Excessive UPnP traffic to IoT devices

SIEM Query:

source="iot_device" AND (event="crash" OR protocol="upnp" AND size>normal)

🔗 References

📤 Share & Export