CVE-2023-33381

7.2 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in the MitraStar GPT-2741GNAC router's ping functionality. Authenticated users can execute arbitrary operating system commands by sending specially crafted input, potentially gaining full control of the router. This affects users of the MitraStar GPT-2741GNAC router with vulnerable firmware.

💻 Affected Systems

Products:
  • MitraStar GPT-2741GNAC router
Versions: AR_g5.8_110WVN0b7_2
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to router management interface. Default credentials may increase risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router compromise allowing attacker to intercept all network traffic, install persistent backdoors, pivot to internal networks, and use router as attack platform.

🟠

Likely Case

Router takeover leading to network traffic interception, credential theft, and potential lateral movement to connected devices.

🟢

If Mitigated

Limited impact if strong authentication controls and network segmentation prevent unauthorized access to router management interface.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authenticated access but is simple to execute once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official vendor advisory found

Restart Required: Yes

Instructions:

1. Check vendor website for firmware updates
2. Download latest firmware
3. Backup router configuration
4. Upload firmware via web interface
5. Reboot router
6. Restore configuration if needed

🔧 Temporary Workarounds

Disable ping functionality

all

Remove or restrict access to ping diagnostic tool in router interface

Network segmentation

all

Isolate router management interface from general network access

🧯 If You Can't Patch

  • Change default credentials and implement strong authentication
  • Restrict management interface access to specific IP addresses only

🔍 How to Verify

Check if Vulnerable:

Check router firmware version matches AR_g5.8_110WVN0b7_2 via web interface or SSH

Check Version:

Check router web interface under System Information or use telnet/SSH if available

Verify Fix Applied:

Verify firmware version has been updated to newer version than AR_g5.8_110WVN0b7_2

📡 Detection & Monitoring

Log Indicators:

  • Unusual ping commands in router logs
  • Multiple failed authentication attempts followed by ping activity
  • Unexpected system command execution

Network Indicators:

  • Unusual outbound connections from router
  • Traffic patterns suggesting router compromise

SIEM Query:

source="router" AND (command="ping" AND (payload="|" OR payload=";" OR payload="`"))

🔗 References

📤 Share & Export