CVE-2024-57473

9.8 CRITICAL

📋 TL;DR

H3C N12 V100R005 routers contain a critical buffer overflow vulnerability in the MAC address editing function due to insufficient input validation. Attackers can exploit this by sending specially crafted POST requests to /bin/webs, potentially causing device crashes or remote code execution. Organizations using affected H3C N12 routers are at risk.

💻 Affected Systems

Products:
  • H3C N12
Versions: V100R005
Operating Systems: Embedded router OS
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the vulnerable firmware version are affected. The web management interface must be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote unauthenticated attackers gain full control of the router, enabling network pivoting, data interception, and persistent backdoor installation.

🟠

Likely Case

Attackers crash the router causing denial of service, or execute limited commands to disrupt network operations.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the affected router segment.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept demonstrates exploitation via simple HTTP POST requests. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://h3c.com

Restart Required: Yes

Instructions:

1. Check H3C website for security advisory 2. Download latest firmware 3. Backup configuration 4. Upload and install firmware 5. Reboot device 6. Verify installation

🔧 Temporary Workarounds

Disable Web Management Interface

all

Prevent access to vulnerable endpoint by disabling web interface

telnet [router_ip]
system-view
undo ip http enable
undo ip https enable
save

Restrict Network Access

all

Limit access to router management interface using ACLs

telnet [router_ip]
system-view
acl basic 2000
rule permit source [trusted_network]
rule deny
interface [management_interface]
packet-filter 2000 inbound
save

🧯 If You Can't Patch

  • Isolate affected routers in separate VLAN with strict firewall rules
  • Implement network monitoring for POST requests to /bin/webs endpoint

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface or CLI: display version

Check Version:

display version | include Version

Verify Fix Applied:

Verify firmware version is updated beyond V100R005

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /bin/webs
  • Device crash/reboot logs
  • Unusual command execution logs

Network Indicators:

  • HTTP POST requests to /bin/webs with oversized MAC addresses
  • Sudden loss of connectivity to router

SIEM Query:

source_ip="*" AND destination_port=80 AND http_method="POST" AND uri="/bin/webs"

🔗 References

📤 Share & Export