CVE-2023-37564

8.0 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in ELECOM wireless LAN routers that allows authenticated attackers on the same network to execute arbitrary commands with root privileges. The vulnerability affects multiple ELECOM router models and versions, enabling complete device compromise.

💻 Affected Systems

Products:
  • WRC-1167GHBK-S
  • WRC-1167GEBK-S
  • WRC-1167FEBK-S
  • WRC-1167GHBK3-A
  • WRC-1167FEBK-A
Versions: v1.03 and earlier for WRC-1167GHBK-S/GEBK-S, v1.04 and earlier for WRC-1167FEBK-S, v1.24 and earlier for WRC-1167GHBK3-A, v1.18 and earlier for WRC-1167FEBK-A
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected versions are vulnerable in default configurations. Requires authenticated access to the router's web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router takeover, credential theft, network traffic interception, lateral movement to connected devices, and persistent backdoor installation.

🟠

Likely Case

Router configuration modification, DNS hijacking, credential harvesting, and network disruption.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and proper monitoring.

🌐 Internet-Facing: LOW (requires network adjacency, not directly internet exploitable)
🏢 Internal Only: HIGH (authenticated attackers on local network can achieve root access)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the router web interface. The vulnerability is in the web management interface where user input is not properly sanitized before being passed to system commands.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: WRC-1167GHBK-S v1.04+, WRC-1167GEBK-S v1.04+, WRC-1167FEBK-S v1.05+, WRC-1167GHBK3-A v1.25+, WRC-1167FEBK-A v1.19+

Vendor Advisory: https://www.elecom.co.jp/news/security/20230711-01/

Restart Required: Yes

Instructions:

1. Log into router web interface. 2. Navigate to firmware update section. 3. Download latest firmware from ELECOM website. 4. Upload and apply firmware update. 5. Reboot router after update completes.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate router management interface to dedicated VLAN or restrict access to trusted IP addresses only.

Strong Authentication

all

Implement complex passwords and consider multi-factor authentication if supported.

🧯 If You Can't Patch

  • Replace affected routers with patched models or different vendors
  • Implement strict network access controls to limit who can access router management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface: Login > System Information > Firmware Version

Check Version:

Check via router web interface or SSH if enabled: show version or cat /proc/version

Verify Fix Applied:

Verify firmware version is above affected versions: WRC-1167GHBK-S v1.04+, WRC-1167GEBK-S v1.04+, WRC-1167FEBK-S v1.05+, WRC-1167GHBK3-A v1.25+, WRC-1167FEBK-A v1.19+

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts followed by successful login
  • Unexpected configuration changes

Network Indicators:

  • Unusual outbound connections from router
  • DNS queries to suspicious domains
  • Unexpected port scans originating from router

SIEM Query:

source="router_logs" AND (event_type="command_execution" OR event_type="config_change") AND user!="admin"

🔗 References

📤 Share & Export