Hacking

Flaws in 4G Routers of various vendors put millions of users at risk

Security expert discovered multiple flaws in 4G routers manufactured by several companies, some of them could allow attackers to take over the devices.

G Richter, a security researcher at Pen Test Partners discovered multiple vulnerabilities 4G routers manufactured by different vendors.

The issue includes information leak flaws and code execution vulnerabilities. The expert presented the vulnerabilities in a talk at the DEF CON hacking conference, demonstrating that many existing 4G modems and routers are insecure.

“The problem is, a lot of existing 4G modems and routers are pretty insecure. We found critical remotely-exploitable flaws in a selection of devices from variety of vendors, without having to do too much work.” Richter explained. “Plus, there’s only a small pool of OEMs working seriously with cellular technologies, and their hardware (& software dependencies) can be found running in all sorts of places.”  

The experts analyzed a set of 4G routers that included both consumer-grade devices and enterprise equipment.

“In our little research project, we focused mainly on attacking services on the IP layer. We’ve reported everything we found to vendors, who have mainly fixed the issues (except when they haven’t – and by now they’ve had more than long enough!).” states the post published by the experts.

“In increasing numbers, lots of less-bandwidth-demanding consumers are inevitably going to start using cellular for their full-time Internet access,”

Discovered issues were reported to the vendors, fortunately, most of them quickly fixed the vulnerabilities.

The experts criticized the approach of ZTE that refused to address the vulnerabilities discovered in the MF910 and MF65+ routers because they are end-of-life products.

The vulnerabilities include the leak of the administrator password, a command injection issue and a Cross-Site Scripting in an unused “test” page.

“The ZTE MF910 is a really interesting router for reversing, mainly because it’s full of nice debug calls, and underused functionality. Also, it’s never going to get patched, and it’s really cheap. So it’s a great 4G router to start messing around with.” reads the post published by Pen Test Partners.

“This post gives a bit of a rundown of the debug functionality and bugs we found in the ZTE MF910. The same (or similar) API calls might be found in other ZTE MF* series routers. We’re not entirely sure, because ZTE aren’t exactly proactive at fixing issues reported to them.”

ZTE only addressed the flaws in the MF920 routers that shared the same with the above devices. The experts explained that the vulnerabilities could be chained to gain arbitrary code execution on vulnerable devices.

Below two vulnerabilities discovered in the MF920 ZTE 4G router:

  • CVE-2019-3411 – Information Leak (7.5 high severity CVSS v3.0 base score)
  • CVE-2019-3412 – Arbitrary Command Execution (9.8 critical severity CVSS v3.0 base score)

The researcher also found security vulnerabilities in 4G routers manufactured by Netgear and TP-LINK. The flaws include a cross-site request forgery bypass in the Netgear Nighthawk M1 Mobile router CVE-2019-14526) and a post-authentication command injection (CVE-2019-14527) that could be exploited by an attacker to execute arbitrary code on the vulnerable device in case the web interface isn’t protected with a strong password.

Experts also discovered security flaws in TP-LINK’s M7350 4G LTE Mobile wireless router, including command injection flaws (CVE-2019-12103, CVE-2019-12104).

“Those manufacturers who are going to be selling 5G routers are currently selling 3G and 4G routers. Which – and I really cannot stress this enough – are mainly bad.”

Other details are included in the analysis published by the experts.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – 4g routers, hacking)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Silent Ransom Group targeting law firms, the FBI warns

FBI warns Silent Ransom Group has targeted U.S. law firms for 2 years using callback…

6 hours ago

Leader of Qakbot cybercrime network indicted in U.S. crackdown

The U.S. indicted Russian Rustam Gallyamov for leading the Qakbot botnet, which infected 700K+ devices…

11 hours ago

Operation RapTor led to the arrest of 270 dark web vendors and buyers

Law enforcement operation codenamed 'Operation RapTor' led to the arrest of 270 dark web vendors…

1 day ago

Chinese threat actors exploited Trimble Cityworks flaw to breach U.S. local government networks

A Chinese threat actor, tracked as UAT-6382, exploited a patched Trimble Cityworks flaw to deploy…

2 days ago

U.S. CISA adds a Samsung MagicINFO 9 Server flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Samsung MagicINFO 9 Server vulnerability to its…

2 days ago

New Signal update stops Windows from capturing user chats

Signal implements new screen security on Windows 11, blocking screenshots by default to protect user…

2 days ago