CVE-2023-29708

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to force a factory reset on WavLink WavRouter devices via a crafted payload sent to the /cgi-bin/adm.cgi endpoint. Attackers can remotely restore devices to default settings, disrupting network connectivity and potentially enabling further attacks. This affects WavLink WavRouter RPT70HA1.x devices exposed to untrusted networks.

💻 Affected Systems

Products:
  • WavLink WavRouter
Versions: RPT70HA1.x
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with web interface enabled. No authentication required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete network disruption, loss of configuration, potential credential exposure, and enabling of follow-on attacks after reset.

🟠

Likely Case

Network downtime, service disruption, and need for manual reconfiguration of affected devices.

🟢

If Mitigated

Limited to isolated lab environments or properly segmented networks with no internet exposure.

🌐 Internet-Facing: HIGH - Directly exploitable over HTTP without authentication if device is internet-facing.
🏢 Internal Only: MEDIUM - Requires internal network access but still exploitable without authentication.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST request to vulnerable endpoint. Proof-of-concept code available in GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Check WavLink website for firmware updates. If update exists, download and apply through web interface.

🔧 Temporary Workarounds

Disable web interface

all

Disable the router's web management interface if not required for operations.

Network segmentation

all

Place affected routers in isolated network segments with strict access controls.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices from untrusted networks
  • Deploy network-based intrusion detection to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check device model and firmware version via web interface or SSH. If running RPT70HA1.x firmware, assume vulnerable.

Check Version:

Check web interface status page or use SSH command if available: cat /proc/version

Verify Fix Applied:

No official fix available. Monitor for firmware updates from vendor.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /cgi-bin/adm.cgi with reset parameters
  • Unexpected factory reset events in system logs

Network Indicators:

  • HTTP traffic to router on port 80/443 containing reset payloads
  • Sudden loss of connectivity from router

SIEM Query:

source="router_logs" AND (uri="/cgi-bin/adm.cgi" OR message="factory reset")

🔗 References

📤 Share & Export