CVE-2025-50753

8.4 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to escape the restricted SSH shell on Mitrastar GPT-2741GNAC-N2 devices and gain root shell access. By exploiting a command injection flaw in the 'deviceinfo show file' command, attackers can execute arbitrary commands with full system privileges. This affects all users of these specific router devices.

💻 Affected Systems

Products:
  • Mitrastar GPT-2741GNAC-N2
Versions: All versions prior to patch
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default restricted SSH shell configuration. No special configuration needed for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to install persistent backdoors, intercept all network traffic, pivot to internal networks, and permanently brick the device.

🟠

Likely Case

Attackers gain full control of the router to intercept credentials, redirect traffic to malicious sites, or use the device as a foothold for internal network attacks.

🟢

If Mitigated

Limited impact if SSH access is disabled or restricted to trusted networks only, though the vulnerability remains present.

🌐 Internet-Facing: HIGH - These are typically internet-facing routers, and SSH is often enabled by default, making them directly accessible from the internet.
🏢 Internal Only: MEDIUM - If SSH is accessible internally, attackers with network access could exploit this to gain router control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires SSH access (authenticated) but is trivial to execute with a single command injection payload.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None provided in references

Restart Required: No

Instructions:

Check vendor website for firmware updates. If available, download latest firmware and apply through device web interface or management tools.

🔧 Temporary Workarounds

Disable SSH Access

linux

Completely disable SSH service on the router to prevent exploitation

Check web interface for SSH settings and disable
Use CLI: configure terminal -> no service ssh

Restrict SSH Network Access

all

Limit SSH access to specific trusted IP addresses only

Configure firewall rules to restrict SSH port 22 to management IPs
Use access control lists if supported

🧯 If You Can't Patch

  • Isolate affected devices in separate network segments with strict firewall rules
  • Implement network monitoring for unusual SSH activity or command injection attempts

🔍 How to Verify

Check if Vulnerable:

SSH to device, in restricted shell, run: deviceinfo show file " /bin/sh" (with quotes and space). If you get root shell, device is vulnerable.

Check Version:

Check firmware version in web interface or use: deviceinfo show version

Verify Fix Applied:

Attempt the exploit command after applying fixes - should receive error or remain in restricted shell.

📡 Detection & Monitoring

Log Indicators:

  • SSH logins followed by 'deviceinfo show file' commands with unusual arguments
  • Shell escape attempts in system logs
  • Root shell access from restricted user accounts

Network Indicators:

  • Unusual SSH connections to router management interface
  • Traffic patterns suggesting router compromise

SIEM Query:

source="router_logs" AND ("deviceinfo show file" OR "bin/sh")

🔗 References

📤 Share & Export