CVE-2023-43893
📋 TL;DR
This CVE describes a command injection vulnerability in Netis N3Mv2 routers version V1.0.1.865. Attackers can execute arbitrary commands on the device by sending crafted payloads to the wakeup_mac parameter in the Wake-On-LAN function. This affects all users of this specific router model and version.
💻 Affected Systems
- Netis N3Mv2 router
📦 What is this software?
N3m Firmware by Netis Systems
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the router allowing attackers to install persistent backdoors, intercept network traffic, pivot to internal networks, or brick the device.
Likely Case
Remote code execution leading to router configuration changes, credential theft, or use as a botnet node.
If Mitigated
Limited impact if network segmentation isolates the router and external access is blocked.
🎯 Exploit Status
The GitHub reference contains detailed exploitation information and proof-of-concept code.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No vendor advisory found
Restart Required: No
Instructions:
Check Netis website for firmware updates. If available, download latest firmware and apply through router admin interface.
🔧 Temporary Workarounds
Disable Wake-On-LAN functionality
allTurn off the vulnerable Wake-On-LAN feature in router settings
Block external access to router admin interface
allConfigure firewall rules to prevent external access to router management interface
🧯 If You Can't Patch
- Replace affected routers with different models or brands
- Implement strict network segmentation to isolate router from critical systems
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in admin interface. If version is V1.0.1.865, device is vulnerable.
Check Version:
Login to router admin interface and check System Status or Firmware Information page
Verify Fix Applied:
Verify firmware version has been updated to a version later than V1.0.1.865
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution in system logs
- Multiple failed or unusual Wake-On-LAN requests
Network Indicators:
- HTTP POST requests to WoL endpoint with unusual MAC address formats
- Outbound connections from router to unexpected destinations
SIEM Query:
source="router_logs" AND ("wakeup_mac" OR "WoL") AND (payload="*;*" OR payload="*|*" OR payload="*`*" OR payload="*$(*")
🔗 References
- https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20wake%20on%20lan%20functionality%20in%20wakeup_mac%20parameter.md
- https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20wake%20on%20lan%20functionality%20in%20wakeup_mac%20parameter.md