CVE-2023-7209

7.5 HIGH

📋 TL;DR

A critical vulnerability in Uniway Router up to version 2.0 allows remote attackers to cause denial of service by exploiting the device reset handler at /boaform/device_reset.cgi. This affects all systems running vulnerable Uniway Router software, potentially disrupting network connectivity. The vendor has not responded to disclosure attempts.

💻 Affected Systems

Products:
  • Uniway Router
Versions: Up to version 2.0
Operating Systems: Embedded router OS
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations with the vulnerable component enabled are affected. The device reset handler is typically accessible via web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router failure requiring physical reset or replacement, causing extended network downtime for all connected devices.

🟠

Likely Case

Router becomes unresponsive, requiring manual reboot and temporary loss of network connectivity.

🟢

If Mitigated

Minimal impact with proper network segmentation and redundant systems in place.

🌐 Internet-Facing: HIGH - Attack can be launched remotely without authentication, making internet-exposed routers particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this, but requires network access to the router management interface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available and the attack requires minimal technical skill to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: Yes

Instructions:

No official patch available. Consider replacing affected routers with supported alternatives.

🔧 Temporary Workarounds

Block Access to Vulnerable Endpoint

linux

Use firewall rules to block access to /boaform/device_reset.cgi

iptables -A INPUT -p tcp --dport 80 -m string --string "/boaform/device_reset.cgi" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string "/boaform/device_reset.cgi" --algo bm -j DROP

Disable Web Management Interface

all

Turn off web-based management if not required

🧯 If You Can't Patch

  • Isolate vulnerable routers in separate network segments with strict access controls
  • Implement network monitoring for unusual traffic patterns to /boaform/device_reset.cgi

🔍 How to Verify

Check if Vulnerable:

Check router web interface version or attempt to access http://[router-ip]/boaform/device_reset.cgi (use caution as this may trigger the vulnerability)

Check Version:

Check router web interface or use nmap -sV -p 80,443 [router-ip] to identify service versions

Verify Fix Applied:

Verify firewall rules are blocking the vulnerable endpoint or that web interface is disabled

📡 Detection & Monitoring

Log Indicators:

  • Multiple requests to /boaform/device_reset.cgi in short time
  • Router reboot events without administrative action

Network Indicators:

  • Unusual traffic patterns to router management interface
  • HTTP requests to device_reset.cgi from unexpected sources

SIEM Query:

source="router_logs" AND (uri="/boaform/device_reset.cgi" OR event="reboot") | stats count by src_ip

🔗 References

📤 Share & Export