CVE-2025-57293

8.8 HIGH

📋 TL;DR

A command injection vulnerability in COMFAST CF-XR11 routers allows attackers to execute arbitrary commands via a POST request to the multi_pppoe API. This can lead to full device compromise, unauthorized access to sensitive files, or execution of malicious code. Users of COMFAST CF-XR11 routers with firmware V2.7.2 are affected.

💻 Affected Systems

Products:
  • COMFAST CF-XR11
Versions: V2.7.2
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default firmware configuration and requires no special settings to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise leading to persistent backdoor installation, credential theft, network pivoting, and complete control over router functions.

🟠

Likely Case

Unauthorized command execution leading to network reconnaissance, data exfiltration, or device disruption.

🟢

If Mitigated

Limited impact if network segmentation, strict firewall rules, and proper access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a crafted POST request to the vulnerable endpoint, which is straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch is currently available. Monitor COMFAST vendor communications for firmware updates.

🔧 Temporary Workarounds

Block Vulnerable Endpoint

linux

Use firewall rules to block access to the vulnerable /cgi-bin/mbox-config endpoint

iptables -A INPUT -p tcp --dport 80 -m string --string "/cgi-bin/mbox-config" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string "/cgi-bin/mbox-config" --algo bm -j DROP

Disable Web Management Interface

linux

Disable the web management interface if not required for operations

uci set uhttpd.main.listen_http=''
uci set uhttpd.main.listen_https=''
uci commit uhttpd
/etc/init.d/uhttpd restart

🧯 If You Can't Patch

  • Isolate affected devices in a separate network segment with strict firewall rules
  • Implement network monitoring and intrusion detection for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if the device responds to POST requests at /cgi-bin/mbox-config?method=SET&section=multi_pppoe with action=one_click_redial

Check Version:

cat /etc/version or check web interface firmware version

Verify Fix Applied:

Verify that command injection attempts no longer succeed and that the phy_interface parameter is properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /cgi-bin/mbox-config with shell metacharacters in parameters
  • System command execution from webmgnt process

Network Indicators:

  • HTTP POST requests to /cgi-bin/mbox-config with suspicious parameter values
  • Unusual outbound connections from router

SIEM Query:

source="router_logs" AND url="/cgi-bin/mbox-config" AND (method="POST" OR params CONTAINS "one_click_redial")

🔗 References

📤 Share & Export