CVE-2023-43134
📋 TL;DR
This vulnerability in Netis 360RAC1200 routers allows unauthenticated attackers to access sensitive device information and user tokens, enabling them to log into the backend management system. It affects users of Netis 360RAC1200 routers with vulnerable firmware. The CVSS 9.8 score indicates critical severity.
💻 Affected Systems
- Netis 360RAC1200
📦 What is this software?
360r Firmware by Netis Systems
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of router with ability to intercept/modify traffic, deploy malware to connected devices, and use as pivot point for network attacks.
Likely Case
Unauthorized access to router configuration, network traffic monitoring, and credential theft from connected devices.
If Mitigated
Limited impact if router is behind firewall with restricted WAN access and strong network segmentation.
🎯 Exploit Status
Public GitHub repository contains exploit details. Attack requires no authentication and minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Check Netis website for firmware updates. Consider replacing vulnerable hardware.
🔧 Temporary Workarounds
Network Isolation
allPlace router behind firewall with strict inbound rules and disable WAN management access.
Access Restriction
allConfigure firewall to only allow management access from specific trusted IP addresses.
🧯 If You Can't Patch
- Replace vulnerable router with different model from vendor with better security track record
- Implement network segmentation to isolate router from critical systems
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in web interface. If version is v1.3.4517, device is vulnerable.
Check Version:
Login to router web interface and check System Status or Firmware Version page.
Verify Fix Applied:
Verify firmware has been updated to version newer than v1.3.4517. Test unauthorized access attempts fail.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to management interface
- Multiple failed login attempts followed by successful login from unusual IP
Network Indicators:
- Unusual outbound connections from router
- Traffic patterns suggesting router compromise
SIEM Query:
source_ip="router_ip" AND (event_type="authentication" AND result="success") FROM unknown_ip_range