CVE-2025-5437

5.3 MEDIUM

📋 TL;DR

This critical vulnerability in Multilaser Sirius RE016 routers allows attackers to bypass authentication on the password change handler remotely. Attackers can change administrative passwords without credentials, potentially taking full control of affected devices. All users of Multilaser Sirius RE016 MLT1.0 routers are affected.

💻 Affected Systems

Products:
  • Multilaser Sirius RE016
Versions: MLT1.0
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the /cgi-bin/cstecgi.cgi endpoint specifically for password change functionality. All devices with this firmware version appear vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover allowing attackers to reconfigure network settings, intercept traffic, install malware, or use the device as a pivot point into internal networks.

🟠

Likely Case

Unauthorized password changes leading to loss of administrative access, potential network disruption, and exposure of connected devices.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH - Attack can be launched remotely without authentication, making internet-exposed devices immediate targets.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit this, but requires network access to the device.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Python exploit script is publicly available on GitHub. The vulnerability requires no authentication and has simple exploitation steps.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor was contacted but did not respond. Consider workarounds or replacement.

🔧 Temporary Workarounds

Network Access Control

linux

Restrict access to the router's web interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Disable Remote Management

all

Turn off remote administration features if not required

🧯 If You Can't Patch

  • Isolate affected routers in separate VLANs with strict firewall rules
  • Implement network monitoring for unauthorized access attempts to /cgi-bin/cstecgi.cgi

🔍 How to Verify

Check if Vulnerable:

Check if device model is Multilaser Sirius RE016 and firmware version is MLT1.0. Attempt to access /cgi-bin/cstecgi.cgi with password change parameters without authentication.

Check Version:

Check router web interface at System Status or About page, or use nmap -sV -p 80,443 [ROUTER_IP]

Verify Fix Applied:

No official fix available to verify. After workarounds, test that password change requires proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to /cgi-bin/cstecgi.cgi
  • Multiple failed login attempts followed by successful password change
  • Password change events from unexpected IP addresses

Network Indicators:

  • HTTP POST requests to /cgi-bin/cstecgi.cgi with password parameters from unauthorized sources
  • Unusual traffic patterns from router to external IPs

SIEM Query:

source="router_logs" AND (uri="/cgi-bin/cstecgi.cgi" AND method="POST" AND (NOT src_ip IN [authorized_ips]))

🔗 References

📤 Share & Export