<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>DrayTek — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/draytek/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/draytek/feed.xml" rel="self" type="application/rss+xml"/><item><title>DrayTek Vigor 2960 Unauthenticated Remote Command Execution via CVE-2022-50994</title><link>https://feed.craftedsignal.io/briefs/2024-01-draytek-rce/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-draytek-rce/</guid><description>DrayTek Vigor 2960 firmware versions prior to 1.5.1.4 are vulnerable to OS command injection (CVE-2022-50994) in the CGI login handler, allowing unauthenticated remote attackers to execute arbitrary commands by injecting shell metacharacters into the formpassword parameter if the target account has MOTP enabled.</description><content:encoded><![CDATA[<p>DrayTek Vigor 2960 devices running firmware versions prior to 1.5.1.4 are susceptible to a critical OS command injection vulnerability, tracked as CVE-2022-50994. This flaw resides in the CGI login handler and allows unauthenticated remote attackers to inject arbitrary commands by manipulating the <code>formpassword</code> parameter. Successful exploitation requires knowledge of a valid username and that the target account has MOTP authentication enabled. This vulnerability poses a significant risk as it enables attackers to execute commands with web server privileges, potentially leading to full system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a DrayTek Vigor 2960 device running a vulnerable firmware version (prior to 1.5.1.4).</li>
<li>The attacker discovers or obtains a valid username for the target device.</li>
<li>The attacker determines that the target account has MOTP authentication enabled.</li>
<li>The attacker crafts a malicious HTTP POST request to the CGI login handler, injecting shell metacharacters into the <code>formpassword</code> parameter.</li>
<li>The crafted request is sent to the <code>/cgi-bin/loginCGI</code> endpoint.</li>
<li>The vulnerable <code>otp_check.sh</code> script receives the unsanitized input from the <code>formpassword</code> parameter.</li>
<li>The injected shell metacharacters are interpreted by the script, executing arbitrary OS commands with the privileges of the web server.</li>
<li>The attacker achieves remote code execution, potentially gaining complete control of the affected device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2022-50994 allows an unauthenticated remote attacker to execute arbitrary commands on the DrayTek Vigor 2960 device. This can lead to complete system compromise, including data exfiltration, configuration changes, and denial of service. Given that DrayTek Vigor devices are often used in small to medium-sized businesses, a successful attack could disrupt network operations and lead to significant financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade DrayTek Vigor 2960 devices to firmware version 1.5.1.4 or later to patch CVE-2022-50994.</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2022-50994 Exploitation — DrayTek Vigor CGI Login Attempt&rdquo; to your SIEM to identify potential exploitation attempts against the <code>/cgi-bin/loginCGI</code> endpoint.</li>
<li>Enable logging for web server requests to capture relevant data for the Sigma rule and future investigations.</li>
<li>Review user accounts and disable MOTP authentication where it is not required to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>command injection</category><category>rce</category><category>network device</category></item></channel></rss>