CVE-2024-47044

5.3 MEDIUM

📋 TL;DR

Multiple Home Gateway/Hikari Denwa routers from NTT East Corporation are vulnerable to insufficient access restrictions on Device Setting pages. Attackers who discover the router's WAN-side IPv6 address can access configuration pages remotely, potentially modifying settings. Only routers subscribed and used in NTT East Corporation service areas are affected.

💻 Affected Systems

Products:
  • Home Gateway/Hikari Denwa routers from NTT East Corporation
Versions: Specific firmware versions not detailed in references
Operating Systems: Embedded router OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects routers subscribed/used in NTT East Corporation service areas. NTT West Corporation routers are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full administrative access to router, changes network settings, intercepts traffic, or disables security features.

🟠

Likely Case

Attacker modifies router settings like DNS, firewall rules, or port forwarding to enable further attacks.

🟢

If Mitigated

If IPv6 WAN access is blocked or router uses non-default IPv6 addresses, impact is limited to configuration viewing only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires discovering the router's WAN-side IPv6 address, which may be predictable or discoverable through network scanning.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in references

Vendor Advisory: https://web116.jp/ced/support/news/contents/2024/20240930.html

Restart Required: Yes

Instructions:

1. Check router model and firmware version via admin interface. 2. Visit vendor support pages for firmware updates. 3. Apply firmware update following vendor instructions. 4. Restart router after update.

🔧 Temporary Workarounds

Disable IPv6 WAN Access

all

Block external IPv6 access to router administration interface

Use IPv6 Firewall Rules

all

Configure firewall to deny incoming IPv6 connections to router administration ports

🧯 If You Can't Patch

  • Segment router on isolated network segment with strict firewall rules
  • Monitor for unauthorized configuration changes and unusual network traffic

🔍 How to Verify

Check if Vulnerable:

Attempt to access router Device Setting page via WAN-side IPv6 address from external network

Check Version:

Check firmware version in router admin interface under System or About sections

Verify Fix Applied:

After update, verify Device Setting page is no longer accessible via WAN-side IPv6 address

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to router admin pages from external IPv6 addresses
  • Unexpected configuration changes

Network Indicators:

  • External IPv6 connections to router administration ports (typically 80, 443, 8080)

SIEM Query:

source_ip IN (external_IPv6_range) AND dest_port IN (80,443,8080) AND dest_ip = router_ip

🔗 References

📤 Share & Export