CVE-2025-44635

9.8 CRITICAL

📋 TL;DR

This critical vulnerability allows unauthenticated attackers to execute arbitrary commands with root privileges on affected H3C routers by bypassing authentication and injecting malicious commands into ACL and user group fields. It affects multiple H3C router series with specific firmware versions, enabling complete remote device takeover.

💻 Affected Systems

Products:
  • H3C ER2200G2
  • ERG2-450W
  • ERG2-1200W
  • ERG2-1350W
  • NR1200W
  • ER3100G2
  • ER3200G2
  • ER3260G2
  • ER5100G2
  • ER5200G2
  • ER6300G2
  • ER8300G2
  • ER8300G2-X
  • GR3200
  • GR5200
  • GR8300
  • GR-1800AX
  • GR-3000AX
  • GR-5400AX
Versions: Before ERG2AW-MNW100-R1117 for ER series; before ERHMG2-MNW100-R1126 for ERG2 series; before MiniGR1B0V100R018L50 for GR series; before MiniGRW1B0V100R009L50 for GR-1800AX; before SWBRW1A0V100R007L50 for GR-3000AX; before SWBRW1B0V100R009L50 for GR-5400AX
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected routers with default configurations are vulnerable. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of affected routers allowing attackers to intercept all network traffic, deploy malware, pivot to internal networks, and maintain persistent access.

🟠

Likely Case

Attackers gain root access to routers, enabling traffic interception, credential theft, network reconnaissance, and potential ransomware deployment.

🟢

If Mitigated

With proper network segmentation and access controls, impact limited to isolated network segments rather than entire infrastructure.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them prime targets for remote exploitation without authentication.
🏢 Internal Only: MEDIUM - Internal routers could be targeted through compromised internal systems or malicious insiders.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted requests to vulnerable endpoints. The authentication bypass and command injection make this relatively straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ERG2AW-MNW100-R1117 for ER series; ERHMG2-MNW100-R1126 for ERG2 series; MiniGR1B0V100R018L50 for GR series; MiniGRW1B0V100R009L50 for GR-1800AX; SWBRW1A0V100R007L50 for GR-3000AX; SWBRW1B0V100R009L50 for GR-5400AX

Vendor Advisory: https://www.h3c.com/cn/Service/Online_Help/psirt/security-notice/detail_2021.htm?Id=459

Restart Required: Yes

Instructions:

1. Download appropriate firmware from H3C support portal. 2. Backup current configuration. 3. Upload firmware via web interface or CLI. 4. Apply firmware update. 5. Reboot router. 6. Verify firmware version.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected routers in separate network segments to limit lateral movement if compromised.

Access Control Restrictions

all

Restrict management interface access to trusted IP addresses only.

access-list 10 permit 192.168.1.0 0.0.0.255
line vty 0 4
access-class 10 in

🧯 If You Can't Patch

  • Immediately isolate affected routers from internet and critical internal networks
  • Implement strict network monitoring and alerting for suspicious router activity

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface (System > Device Information) or CLI command 'display version' and compare with patched versions listed above.

Check Version:

display version

Verify Fix Applied:

Confirm firmware version matches or exceeds patched versions listed in fix_official section.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication bypass attempts
  • Unexpected command execution in ACL/user group logs
  • Multiple failed login attempts followed by successful access
  • Suspicious URL patterns with command injection attempts

Network Indicators:

  • Unusual outbound connections from routers
  • Traffic patterns inconsistent with normal router operations
  • Unexpected SSH/Telnet connections to router management interfaces

SIEM Query:

source="router_logs" AND ("authentication bypass" OR "command injection" OR "ACL manipulation")

🔗 References

📤 Share & Export