CVE-2023-28381

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary operating system commands on Peplink Surf SOHO HW1 devices via command injection in the admin.cgi MVPN_trial_init functionality. Attackers can achieve remote code execution by sending specially crafted HTTP requests. Only users of affected Peplink Surf SOHO HW1 devices running vulnerable firmware versions are impacted.

💻 Affected Systems

Products:
  • Peplink Surf SOHO HW1
Versions: v6.3.5 and potentially earlier versions
Operating Systems: Embedded Linux firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to admin interface. QEMU testing environment mentioned but vulnerability affects physical devices.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing attacker to install persistent backdoors, pivot to internal networks, steal credentials, or use device as part of botnet.

🟠

Likely Case

Unauthorized administrative access leading to configuration changes, network disruption, or data exfiltration.

🟢

If Mitigated

Limited impact if proper network segmentation and authentication controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but command injection is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v6.3.6 or later

Vendor Advisory: https://www.peplink.com/support/security-advisories/

Restart Required: Yes

Instructions:

1. Log into device admin interface. 2. Navigate to System > Firmware. 3. Check for and install latest firmware update. 4. Reboot device after update completes.

🔧 Temporary Workarounds

Restrict Admin Interface Access

all

Limit access to admin interface to trusted IP addresses only

Configure firewall rules to restrict access to device admin port (typically 443/HTTPS)

Disable Unused Features

all

Disable MVPN trial functionality if not required

Navigate to admin interface > VPN > MVPN and disable trial features

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable devices from critical assets
  • Enforce strong authentication policies and monitor for suspicious admin login attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version in admin interface under System > Firmware. If version is v6.3.5 or earlier, device is vulnerable.

Check Version:

Login to admin web interface and navigate to System > Firmware page

Verify Fix Applied:

Verify firmware version shows v6.3.6 or later after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin login patterns
  • HTTP requests to admin.cgi with MVPN_trial_init containing shell metacharacters
  • Unexpected system command execution in logs

Network Indicators:

  • HTTP POST requests to admin.cgi endpoint with command injection payloads
  • Unusual outbound connections from device

SIEM Query:

source="peplink" AND (uri="*/admin.cgi*" AND (method="POST" OR method="GET") AND (query="*MVPN_trial_init*" AND (query="*;*" OR query="*|*" OR query="*`*")))

🔗 References

📤 Share & Export