CVE-2023-37564
📋 TL;DR
This CVE describes an OS command injection vulnerability in ELECOM wireless LAN routers that allows authenticated attackers on the same network to execute arbitrary commands with root privileges. The vulnerability affects multiple ELECOM router models and versions, enabling complete device compromise.
💻 Affected Systems
- WRC-1167GHBK-S
- WRC-1167GEBK-S
- WRC-1167FEBK-S
- WRC-1167GHBK3-A
- WRC-1167FEBK-A
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete router takeover, credential theft, network traffic interception, lateral movement to connected devices, and persistent backdoor installation.
Likely Case
Router configuration modification, DNS hijacking, credential harvesting, and network disruption.
If Mitigated
Limited impact due to network segmentation, strong authentication controls, and proper monitoring.
🎯 Exploit Status
Exploitation requires authenticated access to the router web interface. The vulnerability is in the web management interface where user input is not properly sanitized before being passed to system commands.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: WRC-1167GHBK-S v1.04+, WRC-1167GEBK-S v1.04+, WRC-1167FEBK-S v1.05+, WRC-1167GHBK3-A v1.25+, WRC-1167FEBK-A v1.19+
Vendor Advisory: https://www.elecom.co.jp/news/security/20230711-01/
Restart Required: Yes
Instructions:
1. Log into router web interface. 2. Navigate to firmware update section. 3. Download latest firmware from ELECOM website. 4. Upload and apply firmware update. 5. Reboot router after update completes.
🔧 Temporary Workarounds
Network Segmentation
allIsolate router management interface to dedicated VLAN or restrict access to trusted IP addresses only.
Strong Authentication
allImplement complex passwords and consider multi-factor authentication if supported.
🧯 If You Can't Patch
- Replace affected routers with patched models or different vendors
- Implement strict network access controls to limit who can access router management interface
🔍 How to Verify
Check if Vulnerable:
Check router firmware version via web interface: Login > System Information > Firmware Version
Check Version:
Check via router web interface or SSH if enabled: show version or cat /proc/version
Verify Fix Applied:
Verify firmware version is above affected versions: WRC-1167GHBK-S v1.04+, WRC-1167GEBK-S v1.04+, WRC-1167FEBK-S v1.05+, WRC-1167GHBK3-A v1.25+, WRC-1167FEBK-A v1.19+
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution in system logs
- Multiple failed authentication attempts followed by successful login
- Unexpected configuration changes
Network Indicators:
- Unusual outbound connections from router
- DNS queries to suspicious domains
- Unexpected port scans originating from router
SIEM Query:
source="router_logs" AND (event_type="command_execution" OR event_type="config_change") AND user!="admin"