CVE-2023-6304

7.2 HIGH

📋 TL;DR

This critical vulnerability allows remote attackers to execute arbitrary operating system commands on Tecno 4G Portable WiFi devices via command injection in the Ping Tool component. Attackers can exploit this by manipulating the 'url' parameter in the /goform/goform_get_cmd_process endpoint. All users of affected Tecno portable WiFi devices are at risk.

💻 Affected Systems

Products:
  • Tecno 4G Portable WiFi TR118
Versions: TR118-M30E-RR-D-EnFrArSwHaPo-OP-V008-20220830 and likely earlier versions
Operating Systems: Embedded Linux/RTOS on the portable WiFi device
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the web management interface of the portable WiFi device. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to install persistent malware, intercept all network traffic, pivot to internal networks, or brick the device.

🟠

Likely Case

Attackers gain shell access to execute commands, potentially stealing credentials, modifying device settings, or using the device as a foothold for further attacks.

🟢

If Mitigated

If properly segmented and monitored, impact limited to the WiFi device itself without lateral movement to other systems.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and public exploits exist for internet-facing devices.
🏢 Internal Only: MEDIUM - Still exploitable from internal networks but requires attacker access to the network segment.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details have been publicly disclosed and require minimal technical skill to execute. The vulnerability is in a web endpoint accessible without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available - vendor did not respond to disclosure

Restart Required: No

Instructions:

No official patch available. Consider the device end-of-life if vendor does not provide firmware update.

🔧 Temporary Workarounds

Disable Web Management Interface

all

Disable the web management interface if not required for operation

Device-specific - check admin interface for disable options

Network Segmentation

all

Isolate the portable WiFi device from critical networks

Configure firewall rules to restrict access to device management interface

🧯 If You Can't Patch

  • Immediately disconnect affected devices from production networks
  • Replace with alternative portable WiFi devices from vendors with active security support

🔍 How to Verify

Check if Vulnerable:

Check device firmware version in admin interface. If version is TR118-M30E-RR-D-EnFrArSwHaPo-OP-V008-20220830 or earlier, assume vulnerable.

Check Version:

Login to device web interface and check firmware version in system settings

Verify Fix Applied:

No verification possible without vendor patch. Assume all current versions are vulnerable.

📡 Detection & Monitoring

Log Indicators:

  • Unusual commands in system logs
  • Multiple failed ping attempts with unusual parameters
  • Web requests to /goform/goform_get_cmd_process with shell metacharacters

Network Indicators:

  • Unusual outbound connections from portable WiFi device
  • Traffic to unexpected destinations
  • Multiple ping requests with embedded commands

SIEM Query:

source="portable-wifi-device" AND (uri="/goform/goform_get_cmd_process" OR command="ping" AND (parameter CONTAINS ";" OR parameter CONTAINS "|" OR parameter CONTAINS "`"))

🔗 References

📤 Share & Export