CVE-2024-28875
📋 TL;DR
The LevelOne WBR-6012 router contains a hard-coded backdoor credential '@m!t2K1' that grants admin access during the first 30 seconds after boot. Attackers can combine this with other vulnerabilities to force a reboot and bypass the time restriction. All users of affected WBR-6012 routers are vulnerable to unauthorized administrative access.
💻 Affected Systems
- LevelOne WBR-6012
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of router with administrative access, enabling network traffic interception, DNS hijacking, credential theft, and deployment of persistent malware.
Likely Case
Unauthorized administrative access leading to network configuration changes, service disruption, and potential lateral movement to connected devices.
If Mitigated
Limited impact if router is behind additional security controls, though local network compromise remains possible.
🎯 Exploit Status
Exploit requires timing (first 30 seconds after boot) or ability to force reboot via other vulnerabilities. The hard-coded credential is publicly documented.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: Yes
Instructions:
1. Check vendor website for firmware updates
2. Download latest firmware
3. Access router admin interface
4. Navigate to firmware update section
5. Upload and apply new firmware
6. Reboot router
🔧 Temporary Workarounds
Disable remote administration
allPrevent external access to router administration interface
Network segmentation
allIsolate router management interface to separate VLAN
🧯 If You Can't Patch
- Replace affected router with different model from different vendor
- Implement strict network access controls and monitor for reboot events
🔍 How to Verify
Check if Vulnerable:
Check router model and firmware version. Attempt authentication with '@m!t2K1' within 30 seconds of reboot.
Check Version:
Check router web interface or use 'show version' via console if available
Verify Fix Applied:
Test authentication with '@m!t2K1' after applying firmware update - should no longer grant access.
📡 Detection & Monitoring
Log Indicators:
- Failed login attempts followed by successful login within 30 seconds of boot
- Multiple reboot events in short timeframe
- Authentication with unusual username patterns
Network Indicators:
- HTTP POST requests to login endpoint with '@m!t2K1' credential
- Unusual administrative access from unexpected IPs
SIEM Query:
source="router_logs" AND (event="authentication_success" AND user="*@m!t2K1*" OR event="reboot" AND count>1 within 5min)