Skip to main content

CVE-2022-36158: n/a in n/a

High
VulnerabilityCVE-2022-36158cvecve-2022-36158
Published: Mon Sep 26 2022 (09/26/2022, 10:07:23 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Contec FXA3200 version 1.13.00 and under suffers from Insecure Permissions in the Wireless LAN Manager interface which allows malicious actors to execute Linux commands with root privilege via a hidden web page (/usr/www/ja/mnt_cmd.cgi).

AI-Powered Analysis

AILast updated: 07/07/2025, 14:10:58 UTC

Technical Analysis

CVE-2022-36158 is a high-severity vulnerability affecting Contec FXA3200 devices running firmware version 1.13.00 and earlier. The vulnerability stems from insecure permissions configured in the Wireless LAN Manager interface, specifically through a hidden web page located at /usr/www/ja/mnt_cmd.cgi. This page allows unauthenticated remote attackers to execute arbitrary Linux commands with root privileges. The vulnerability is classified under CWE-425 (Direct Request ('Forced Browsing')), indicating that the hidden page is accessible without proper access controls or authentication checks. The CVSS 3.1 base score is 8.8, reflecting a high impact on confidentiality, integrity, and availability, with no privileges or user interaction required, and remote access possible over the network. Exploitation involves sending crafted requests to the hidden CGI endpoint, which executes commands as the root user, potentially allowing full system compromise, data exfiltration, or disruption of device functionality. No known exploits in the wild have been reported yet, and no official patches or vendor advisories are currently available. The vulnerability affects embedded Linux-based network devices, likely used in industrial or enterprise environments for wireless LAN management.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those deploying Contec FXA3200 devices in critical infrastructure, manufacturing, or enterprise wireless networks. Successful exploitation can lead to complete device takeover, enabling attackers to manipulate network configurations, intercept or disrupt wireless communications, and pivot to internal networks. Confidentiality is at risk due to potential data leakage, integrity is compromised by unauthorized command execution, and availability can be impacted by device disruption or denial of service. Given the root-level access, attackers could also install persistent backdoors or malware, increasing long-term risk. The lack of authentication and user interaction requirements means that attackers can exploit the vulnerability remotely and stealthily. European organizations relying on these devices without compensating controls may face operational disruptions, regulatory compliance issues (e.g., GDPR breaches), and reputational damage.

Mitigation Recommendations

Immediate mitigation steps include isolating affected Contec FXA3200 devices from untrusted networks to prevent remote exploitation. Network segmentation should be enforced to limit access to management interfaces. Organizations should conduct thorough inventories to identify all affected devices. Since no official patches are currently available, applying compensating controls such as firewall rules blocking access to the /usr/www/ja/mnt_cmd.cgi endpoint and disabling unused web management interfaces is critical. Monitoring network traffic for suspicious requests targeting this CGI path can help detect exploitation attempts. Implementing strict access controls, including VPN or jump hosts for management access, can reduce exposure. Organizations should engage with Contec or authorized vendors to obtain firmware updates or security advisories. Additionally, consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability. Finally, prepare incident response plans to quickly address potential compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-07-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682dfdf5c4522896dcc0ced8

Added to database: 5/21/2025, 4:23:17 PM

Last enriched: 7/7/2025, 2:10:58 PM

Last updated: 8/15/2025, 11:00:59 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats