CVE-2023-38944
📋 TL;DR
This vulnerability allows attackers to bypass access controls in Multilaser RE160V and RE163V routers by modifying an HTTP header, granting complete application access. Affected users are those running the vulnerable firmware versions on these specific router models.
💻 Affected Systems
- Multilaser RE160V
- Multilaser RE163V
📦 What is this software?
Re160v Firmware by Multilaser
Re163v Firmware by Multilaser
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of router administration, allowing attackers to reconfigure network settings, intercept traffic, install malware, or use the router as an attack platform.
Likely Case
Unauthorized access to router administration panel leading to network configuration changes, DNS hijacking, or credential theft.
If Mitigated
Limited impact if routers are behind firewalls with restricted administrative access and network segmentation.
🎯 Exploit Status
The vulnerability involves simple HTTP header manipulation, making exploitation straightforward with basic web tools.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Check Multilaser website for firmware updates. If unavailable, consider workarounds or replacement.
🔧 Temporary Workarounds
Restrict Administrative Access
allLimit router administration to specific IP addresses or disable remote administration entirely.
Network Segmentation
allPlace routers in isolated network segments with strict firewall rules limiting inbound traffic.
🧯 If You Can't Patch
- Replace affected routers with models receiving security updates
- Implement network monitoring for suspicious HTTP header manipulation attempts
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in administration panel. If running affected versions, assume vulnerable.
Check Version:
Login to router admin panel and check firmware version in system settings.
Verify Fix Applied:
Verify firmware has been updated to a version not listed in affected versions. Test access control by attempting header manipulation.
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP requests with modified headers to router administration interface
- Multiple failed login attempts followed by successful access
Network Indicators:
- HTTP traffic to router admin interface with abnormal headers
- Unexpected configuration changes from unknown IP addresses
SIEM Query:
source_ip=* AND dest_ip=router_ip AND http_user_agent CONTAINS 'malicious' OR http_header CONTAINS 'bypass'