CVE-2023-39445

8.8 HIGH

📋 TL;DR

A hidden functionality vulnerability in LOGITEC LAN-WH300N/RE wireless routers allows unauthenticated attackers to execute arbitrary code by sending specially crafted files to the management console. This affects all versions of these routers, potentially giving attackers full control over the device.

💻 Affected Systems

Products:
  • LOGITEC LAN-WH300N/RE
Versions: All versions
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the management console functionality; default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing attackers to intercept all network traffic, deploy malware to connected devices, pivot to internal networks, or use the device as part of a botnet.

🟠

Likely Case

Router takeover leading to network traffic interception, DNS hijacking, credential theft, and lateral movement to connected systems.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted management interface access and network segmentation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted files to the management interface; no authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor for latest firmware

Vendor Advisory: https://www.elecom.co.jp/news/security/20230810-01/

Restart Required: Yes

Instructions:

1. Visit LOGITEC support website 2. Download latest firmware for LAN-WH300N/RE 3. Log into router admin panel 4. Navigate to firmware update section 5. Upload and apply new firmware 6. Reboot router

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent access to management console from external networks

Network Segmentation

all

Isolate router management interface to trusted network segment

🧯 If You Can't Patch

  • Place router behind firewall with strict inbound rules blocking management ports
  • Implement network monitoring for suspicious file upload attempts to router management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version against vendor advisory; if running any version of LAN-WH300N/RE, assume vulnerable.

Check Version:

Log into router web interface and check firmware version in system status/settings page

Verify Fix Applied:

Verify firmware version has been updated to version specified in vendor advisory and test management interface functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload attempts to management interface
  • Multiple failed authentication attempts followed by file uploads
  • Unexpected configuration changes

Network Indicators:

  • Unusual outbound connections from router
  • Traffic patterns suggesting command and control activity
  • DNS queries to suspicious domains

SIEM Query:

source="router_logs" AND (event="file_upload" OR event="config_change") AND user="unauthenticated"

🔗 References

📤 Share & Export