CVE-2023-37566

8.0 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in ELECOM and LOGITEC wireless LAN routers that allows authenticated attackers on the same network to execute arbitrary commands via specially crafted web requests to the management interface. The vulnerability affects multiple router models across various firmware versions, potentially compromising network security and device integrity.

💻 Affected Systems

Products:
  • ELECOM WRC-1167GHBK3-A
  • ELECOM WRC-1167FEBK-A
  • ELECOM WRC-F1167ACF2
  • ELECOM WRC-600GHBK-A
  • ELECOM WRC-733FEBK2-A
  • ELECOM WRC-1467GHBK-A
  • ELECOM WRC-1900GHBK-A
  • LOGITEC LAN-W301NR
Versions: See product-specific version ranges in description
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All listed versions of affected models are vulnerable. Requires network adjacency and authentication to the web management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router compromise leading to network takeover, credential theft, malware deployment, and persistent backdoor installation.

🟠

Likely Case

Router configuration manipulation, network traffic interception, and lateral movement to other devices on the network.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication, and restricted management interface access.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires network adjacency, many routers have web management interfaces exposed to internal networks that could be reached through other compromises.
🏢 Internal Only: HIGH - Attackers on the local network can exploit this vulnerability to gain full control of affected routers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the web management interface, but the command injection mechanism appears straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: WRC-1167GHBK3-A v1.25+, WRC-1167FEBK-A v1.19+

Vendor Advisory: https://www.elecom.co.jp/news/security/20230711-01/

Restart Required: Yes

Instructions:

1. Log into router web interface. 2. Navigate to firmware update section. 3. Download latest firmware from vendor website. 4. Upload and apply firmware update. 5. Reboot router after update completes.

🔧 Temporary Workarounds

Disable Web Management Interface

all

Disable the web-based management interface to prevent exploitation attempts

Router-specific configuration commands vary by model

Restrict Management Interface Access

all

Limit web management interface access to specific trusted IP addresses only

Router-specific access control configuration

🧯 If You Can't Patch

  • Segment affected routers on isolated network segments
  • Implement strict network access controls and monitor for suspicious management interface activity

🔍 How to Verify

Check if Vulnerable:

Check router model and firmware version against affected products list

Check Version:

Check router web interface status page or use telnet/SSH if available

Verify Fix Applied:

Verify firmware version has been updated to patched version

📡 Detection & Monitoring

Log Indicators:

  • Unusual web management interface access patterns
  • Suspicious command execution attempts in router logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unusual outbound connections from router
  • Suspicious traffic patterns from router management interface

SIEM Query:

Search for web requests containing command injection patterns to router management IP addresses

🔗 References

📤 Share & Export