CVE-2023-3333

7.2 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in multiple NEC Aterm router models that allows authenticated attackers with high privileges to execute arbitrary commands with root privileges. The vulnerability requires chaining with CVE-2023-3330 and CVE-2023-3331 to achieve the necessary privilege level. All listed NEC Aterm router models are affected regardless of version.

💻 Affected Systems

Products:
  • NEC Aterm WG2600HP2
  • WG2600HP
  • WG2200HP
  • WG1800HP2
  • WG1800HP
  • WG1400HP
  • WG600HP
  • WG300HP
  • WF300HP
  • WR9500N
  • WR9300N
  • WR8750N
  • WR8700N
  • WR8600N
  • WR8370N
  • WR8175N
  • WR8170N
Versions: All versions
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires chaining with CVE-2023-3330 and CVE-2023-3331 to achieve necessary privilege level for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router with root access, allowing attackers to intercept all network traffic, install persistent backdoors, pivot to internal networks, or brick the device.

🟠

Likely Case

Attackers who have already compromised administrative credentials can execute arbitrary commands to steal sensitive data, modify network configurations, or launch attacks against internal systems.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the router itself, though it could still serve as a foothold for further attacks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authentication and chaining with two other vulnerabilities (CVE-2023-3330 and CVE-2023-3331) to achieve high privilege access first.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific firmware versions

Vendor Advisory: https://jpn.nec.com/security-info/secinfo/nv23-007_en.html

Restart Required: Yes

Instructions:

1. Visit the NEC security advisory page. 2. Identify your router model. 3. Download the latest firmware from NEC's support site. 4. Log into router admin interface. 5. Navigate to firmware update section. 6. Upload and apply the new firmware. 7. Reboot the router.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected routers in separate network segments to limit potential lateral movement.

Access Control Restrictions

all

Restrict administrative access to trusted IP addresses only and use strong authentication.

🧯 If You Can't Patch

  • Replace affected routers with supported models from different vendors
  • Implement strict network monitoring and anomaly detection for router traffic

🔍 How to Verify

Check if Vulnerable:

Check router model and firmware version against affected list in NEC advisory. If model matches and firmware hasn't been updated since advisory publication, assume vulnerable.

Check Version:

Log into router admin interface and check firmware version in system status or about page.

Verify Fix Applied:

Verify firmware version has been updated to version mentioned in NEC security advisory and test administrative functions for command injection attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in router logs
  • Multiple failed authentication attempts followed by successful login
  • Unexpected configuration changes

Network Indicators:

  • Unusual outbound connections from router
  • Traffic patterns inconsistent with normal router operation
  • Unexpected services running on router

SIEM Query:

source="router_logs" AND (event_type="command_execution" OR event_type="config_change") AND user="admin"

🔗 References

📤 Share & Export