CVE-2025-1143

8.4 HIGH

📋 TL;DR

Billion Electric routers have hard-coded SSH credentials that allow attackers to gain root access. This affects specific router models running embedded Linux. Attackers can fully compromise affected devices.

💻 Affected Systems

Products:
  • Billion Electric routers (specific models not fully detailed in references)
Versions: Unknown specific versions, but appears to affect multiple firmware versions
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects routers with SSH service enabled. Default configurations likely vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover allowing network traffic interception, malware deployment, lateral movement to internal networks, and persistent backdoor installation.

🟠

Likely Case

Attackers gain root access to compromise the router, potentially using it as a pivot point into internal networks or for botnet participation.

🟢

If Mitigated

Limited to isolated router compromise if network segmentation prevents lateral movement and external access is blocked.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires SSH access and knowledge of hard-coded credentials. No authentication bypass needed if SSH is exposed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown specific version - check vendor advisory

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-8414-096ce-2.html

Restart Required: No

Instructions:

1. Check Billion Electric website for firmware updates. 2. Download latest firmware for your router model. 3. Apply firmware update through web interface. 4. Verify SSH credentials have been changed or removed.

🔧 Temporary Workarounds

Disable SSH Service

all

Turn off SSH access if not required for management

Change SSH Credentials

linux

Manually change hard-coded credentials if firmware update not available

passwd root

🧯 If You Can't Patch

  • Isolate affected routers in separate network segments
  • Implement strict firewall rules to limit SSH access to trusted IPs only

🔍 How to Verify

Check if Vulnerable:

Attempt SSH login using known hard-coded credentials (specific credentials not provided in references)

Check Version:

cat /etc/version or check web interface system info

Verify Fix Applied:

Verify SSH login fails with previously known credentials and check firmware version against patched versions

📡 Detection & Monitoring

Log Indicators:

  • Failed SSH login attempts followed by successful root login
  • Multiple root SSH sessions from unusual IPs

Network Indicators:

  • SSH traffic to router from unexpected sources
  • Unusual outbound connections from router

SIEM Query:

source="router_logs" (event="ssh" AND user="root" AND result="success")

🔗 References

📤 Share & Export