CVE-2024-55513

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload arbitrary files to Raisecom network devices via the /upload_netaction.php web interface endpoint. By crafting specific form names, attackers can bypass upload restrictions and potentially gain unauthorized access with server permissions. All organizations using affected Raisecom MSG series devices with vulnerable firmware are at risk.

💻 Affected Systems

Products:
  • Raisecom MSG1200
  • Raisecom MSG2100E
  • Raisecom MSG2200
  • Raisecom MSG2300
Versions: 3.90
Operating Systems: Embedded network OS
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with web interface enabled and accessible are vulnerable. The vulnerability exists in the specific firmware version across multiple device models.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the network device leading to persistent backdoor installation, credential theft, lateral movement within the network, and potential disruption of network services.

🟠

Likely Case

Unauthorized file upload leading to web shell deployment, limited command execution, and potential data exfiltration from the affected device.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external exploitation, though internal threats remain possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The referenced GitHub gist contains proof-of-concept details. The vulnerability requires no authentication and has simple exploitation steps.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Check with Raisecom for firmware updates. If available, download the latest firmware, backup configuration, upload new firmware via web interface or CLI, and verify the update.

🔧 Temporary Workarounds

Disable Web Interface

all

Disable the web management interface if not required for operations

Configure via CLI: no web-management enable

Restrict Network Access

all

Implement network access controls to limit access to the web interface

Configure ACLs: access-list 100 deny tcp any any eq 80
access-list 100 deny tcp any any eq 443
access-list 100 permit ip any any

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices from untrusted networks
  • Deploy web application firewall (WAF) rules to block requests to /upload_netaction.php with suspicious parameters

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via CLI: show version. If version is 3.90 on affected models, device is vulnerable.

Check Version:

show version

Verify Fix Applied:

After applying any mitigation, attempt to access /upload_netaction.php with crafted form names. Successful upload should be blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /upload_netaction.php
  • File upload attempts with unusual form names
  • Unauthorized file creation in web directories

Network Indicators:

  • Unusual outbound connections from network devices
  • HTTP traffic to device management interfaces from unexpected sources

SIEM Query:

source="network_device" AND (url="/upload_netaction.php" OR method="POST") AND (form_data CONTAINS "filename" OR user_agent="curl" OR user_agent="wget")

🔗 References

📤 Share & Export