CVE-2025-5379

4.3 MEDIUM

📋 TL;DR

The NuCom NC-WR744G router version 8.5.5 Build 20200530.307 contains hard-coded credentials in its console application, allowing attackers to gain unauthorized administrative access. This affects all users of this specific router version. Attackers can exploit this remotely without authentication.

💻 Affected Systems

Products:
  • NuCom NC-WR744G
Versions: 8.5.5 Build 20200530.307
Operating Systems: Embedded router OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific build mentioned; other versions may or may not be vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of router with ability to modify configurations, intercept traffic, install malware, or use as pivot point into internal network.

🟠

Likely Case

Unauthorized administrative access to router leading to network configuration changes, DNS hijacking, or credential harvesting.

🟢

If Mitigated

Limited impact if router is behind firewall with strict inbound rules and network segmentation.

🌐 Internet-Facing: HIGH - Attackers can exploit remotely without authentication if router is exposed to internet.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit if they reach the management interface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Hard-coded credentials typically require minimal technical skill to exploit once known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor did not respond to disclosure.

🔧 Temporary Workarounds

Change default credentials

all

Change all administrative passwords including CMCCAdmin, useradmin, and CUAdmin accounts

Login to router admin interface and navigate to password/security settings

Disable remote management

all

Turn off WAN-side management access to prevent remote exploitation

Navigate to remote management/administration settings and disable

🧯 If You Can't Patch

  • Replace affected router with different model/vendor
  • Place router behind firewall with strict inbound rules blocking management ports

🔍 How to Verify

Check if Vulnerable:

Attempt to login using hard-coded credentials: CMCCAdmin/useradmin/CUAdmin with common/default passwords

Check Version:

Check router web interface or use command: show version (if CLI available)

Verify Fix Applied:

Verify new strong passwords are required for all administrative accounts and remote management is disabled

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login with default credentials
  • Administrative login from unexpected IP addresses

Network Indicators:

  • External connections to router management ports (typically 80, 443, 23, 22)
  • Traffic patterns indicating configuration changes

SIEM Query:

source_ip=external AND (dest_port=80 OR dest_port=443 OR dest_port=23) AND event_type=authentication_success

🔗 References

📤 Share & Export