Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-30800: CWE-787 Out-of-bounds Write in MikroTik RouterOS

0
High
VulnerabilityCVE-2023-30800cvecve-2023-30800cwe-787
Published: Thu Sep 07 2023 (09/07/2023, 15:43:54 UTC)
Source: CVE Database V5
Vendor/Project: MikroTik
Product: RouterOS

Description

The web server used by MikroTik RouterOS version 6 is affected by a heap memory corruption issue. A remote and unauthenticated attacker can corrupt the server's heap memory by sending a crafted HTTP request. As a result, the web interface crashes and is immediately restarted. The issue was fixed in RouterOS 6.49.10 stable. RouterOS version 7 is not affected.

AI-Powered Analysis

AILast updated: 11/21/2025, 16:28:29 UTC

Technical Analysis

CVE-2023-30800 is a heap memory corruption vulnerability classified under CWE-787 (Out-of-bounds Write) affecting the web server component of MikroTik RouterOS version 6, specifically versions 6.48.8 and 6.49.9. The vulnerability arises from improper handling of crafted HTTP requests, which allows a remote attacker with no authentication or user interaction to send maliciously crafted HTTP requests that cause an out-of-bounds write in the heap memory of the web server process. This memory corruption leads to a crash of the web interface, which then immediately restarts. While the vulnerability does not allow direct code execution or data confidentiality/integrity compromise, the forced crash and restart can cause denial of service (DoS) conditions, disrupting network management and potentially impacting network availability. RouterOS version 7 is not affected, and the issue was resolved in RouterOS 6.49.10 stable. The CVSS v3.1 base score is 7.5, reflecting high severity due to network attack vector, low attack complexity, no privileges required, no user interaction, and a significant impact on availability. No known exploits have been reported in the wild to date, but the vulnerability’s characteristics make it a candidate for exploitation in the future, especially in environments where MikroTik devices are exposed to untrusted networks. The vulnerability’s root cause is a classic out-of-bounds write, a common memory safety issue that can lead to unpredictable behavior including crashes and potentially more severe exploitation if combined with other vulnerabilities.

Potential Impact

For European organizations, the primary impact of CVE-2023-30800 is on availability. The vulnerability can be exploited remotely without authentication, allowing attackers to cause repeated crashes and restarts of the MikroTik RouterOS web interface, which may disrupt network management and monitoring capabilities. This can lead to temporary denial of service conditions affecting network operations, especially in environments where the web interface is critical for device configuration and monitoring. Although the vulnerability does not directly compromise confidentiality or integrity, the loss of availability can have cascading effects on business continuity, incident response, and operational efficiency. Organizations relying on MikroTik RouterOS version 6 in critical infrastructure sectors such as telecommunications, government, finance, and utilities may face increased risk of service interruptions. Additionally, if attackers use this vulnerability as a distraction or part of a multi-stage attack, it could facilitate further exploitation or lateral movement within networks. The lack of required authentication and user interaction increases the risk profile, particularly for devices exposed to the internet or untrusted networks.

Mitigation Recommendations

1. Immediate upgrade of all MikroTik RouterOS devices running version 6.48.8 or 6.49.9 to version 6.49.10 or later, where the vulnerability is patched. 2. Restrict access to the RouterOS web interface by implementing network segmentation and firewall rules to limit HTTP access only to trusted management networks or IP addresses. 3. Disable the web interface if it is not required for device management, or replace it with secure management methods such as SSH with strong authentication. 4. Monitor network traffic for unusual or malformed HTTP requests targeting MikroTik devices, using intrusion detection/prevention systems (IDS/IPS) with updated signatures. 5. Regularly audit and inventory MikroTik devices to ensure no vulnerable versions remain in production. 6. Implement robust logging and alerting on device crashes and restarts to detect potential exploitation attempts early. 7. Educate network administrators about the vulnerability and the importance of timely patching and access control to reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2023-04-18T10:31:45.962Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69209279b50ca2a0e366a949

Added to database: 11/21/2025, 4:25:29 PM

Last enriched: 11/21/2025, 4:28:29 PM

Last updated: 11/21/2025, 6:41:15 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats