CVE-2023-43134

9.8 CRITICAL

📋 TL;DR

This vulnerability in Netis 360RAC1200 routers allows unauthenticated attackers to access sensitive device information and user tokens, enabling them to log into the backend management system. It affects users of Netis 360RAC1200 routers with vulnerable firmware. The CVSS 9.8 score indicates critical severity.

💻 Affected Systems

Products:
  • Netis 360RAC1200
Versions: v1.3.4517
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default configuration. All devices running this firmware version are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of router with ability to intercept/modify traffic, deploy malware to connected devices, and use as pivot point for network attacks.

🟠

Likely Case

Unauthorized access to router configuration, network traffic monitoring, and credential theft from connected devices.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted WAN access and strong network segmentation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing, making them prime targets for exploitation.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they gain network access, but external exposure is primary concern.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repository contains exploit details. Attack requires no authentication and minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Check Netis website for firmware updates. Consider replacing vulnerable hardware.

🔧 Temporary Workarounds

Network Isolation

all

Place router behind firewall with strict inbound rules and disable WAN management access.

Access Restriction

all

Configure firewall to only allow management access from specific trusted IP addresses.

🧯 If You Can't Patch

  • Replace vulnerable router with different model from vendor with better security track record
  • Implement network segmentation to isolate router from critical systems

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface. If version is v1.3.4517, device is vulnerable.

Check Version:

Login to router web interface and check System Status or Firmware Version page.

Verify Fix Applied:

Verify firmware has been updated to version newer than v1.3.4517. Test unauthorized access attempts fail.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to management interface
  • Multiple failed login attempts followed by successful login from unusual IP

Network Indicators:

  • Unusual outbound connections from router
  • Traffic patterns suggesting router compromise

SIEM Query:

source_ip="router_ip" AND (event_type="authentication" AND result="success") FROM unknown_ip_range

🔗 References

📤 Share & Export