CVE-2023-52164

5.1 MEDIUM

📋 TL;DR

CVE-2023-52164 allows unauthenticated attackers to read arbitrary files on Digiever DS-2105 Pro devices via the access_device.cgi endpoint. This affects users of unsupported Digiever IoT devices running vulnerable firmware versions.

💻 Affected Systems

Products:
  • Digiever DS-2105 Pro
Versions: 3.1.0.71-11 and possibly earlier
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects products no longer supported by the maintainer according to the CVE description.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files, configuration files, or credentials, potentially leading to full device compromise and lateral movement within the network.

🟠

Likely Case

Unauthenticated file disclosure of configuration files, potentially exposing network settings, credentials, or device information.

🟢

If Mitigated

Limited impact if devices are isolated in segmented networks with strict access controls and monitoring.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request to the CGI endpoint with file path parameter allows arbitrary file read without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None available

Vendor Advisory: Not provided in references

Restart Required: No

Instructions:

No official patch available as products are no longer supported. Consider workarounds or replacement.

🔧 Temporary Workarounds

Network Access Control

linux

Block external access to the device's web interface and restrict internal access to authorized networks only.

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

Web Server Configuration

linux

Disable or restrict access to the vulnerable access_device.cgi endpoint if possible.

mv /path/to/access_device.cgi /path/to/access_device.cgi.disabled

🧯 If You Can't Patch

  • Isolate affected devices in a separate VLAN with strict firewall rules preventing external and unnecessary internal access.
  • Implement network monitoring and intrusion detection for unusual access patterns to the device's web interface.

🔍 How to Verify

Check if Vulnerable:

Send HTTP GET request to http://device_ip/access_device.cgi?file=/etc/passwd and check if file contents are returned.

Check Version:

Check web interface login page or system information page for firmware version.

Verify Fix Applied:

Attempt the same request after implementing workarounds - should receive access denied or 404 error.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /access_device.cgi with file parameter
  • Unusual file access patterns in web server logs

Network Indicators:

  • HTTP GET requests to access_device.cgi endpoint from untrusted sources
  • File path traversal patterns in HTTP parameters

SIEM Query:

source="web_logs" AND uri="/access_device.cgi" AND query="*file=*"

🔗 References

📤 Share & Export