CVE-2023-36143

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary operating system commands on Maxprint Maxlink 1200G routers through the diagnostic tool functionality. Attackers can gain full control of affected devices, potentially compromising network security. Organizations using Maxlink 1200G v3.4.11E routers are affected.

💻 Affected Systems

Products:
  • Maxprint Maxlink 1200G
Versions: v3.4.11E
Operating Systems: Embedded router OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the diagnostic tool functionality specifically. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover allowing attackers to pivot to internal networks, intercept traffic, deploy ransomware, or create persistent backdoors.

🟠

Likely Case

Attackers gain shell access to modify device configuration, intercept network traffic, or use the device as a foothold for further attacks.

🟢

If Mitigated

Limited impact if device is isolated in a segmented network with strict egress filtering and command execution restrictions.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing, making them prime targets for remote exploitation.
🏢 Internal Only: MEDIUM - If compromised, attackers could pivot to internal networks, but requires initial access vector.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on GitHub. Exploitation requires network access to the device's diagnostic interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://maxlink.com

Restart Required: No

Instructions:

No official patch available. Check vendor website for security updates and firmware upgrades.

🔧 Temporary Workarounds

Disable Diagnostic Tool

all

Disable the vulnerable diagnostic tool functionality if not required for operations.

Network Segmentation

all

Isolate Maxlink devices in a separate VLAN with strict access controls.

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to device management interfaces
  • Deploy network-based intrusion detection to monitor for command injection attempts

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or SSH. If version is v3.4.11E, device is vulnerable.

Check Version:

Check web interface System Status page or use vendor-specific CLI commands if available.

Verify Fix Applied:

Verify firmware has been upgraded to a version later than v3.4.11E or diagnostic tool has been disabled.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in diagnostic logs
  • Multiple failed authentication attempts to diagnostic interface
  • Unexpected system configuration changes

Network Indicators:

  • Unusual outbound connections from router
  • Suspicious payloads in HTTP requests to diagnostic endpoints
  • Traffic patterns indicating command execution

SIEM Query:

source="router_logs" AND (event="diagnostic_tool" OR event="command_execution") AND (payload CONTAINS "|" OR payload CONTAINS ";" OR payload CONTAINS "`")

🔗 References

📤 Share & Export