Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-35193: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Peplink Surf SOHO HW1

0
High
VulnerabilityCVE-2023-35193cvecve-2023-35193cwe-78
Published: Wed Oct 11 2023 (10/11/2023, 15:16:55 UTC)
Source: CVE Database V5
Vendor/Project: Peplink
Product: Surf SOHO HW1

Description

An OS command injection vulnerability exists in the api.cgi cmd.mvpn.x509.write functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability is specifically for the `system` call in the file `/web/MANGA/cgi-bin/api.cgi` for firmware version 6.3.5 at offset 0x4bddb8.

AI-Powered Analysis

AILast updated: 11/04/2025, 20:19:46 UTC

Technical Analysis

CVE-2023-35193 is an OS command injection vulnerability identified in the Peplink Surf SOHO HW1 device, specifically in firmware version 6.3.5 running in QEMU. The flaw exists in the api.cgi script, particularly in the cmd.mvpn.x509.write functionality, where user-supplied input is improperly sanitized before being passed to a system call. This improper neutralization of special elements (CWE-78) enables an authenticated attacker to craft a malicious HTTP request that triggers arbitrary command execution on the underlying operating system. The vulnerable code resides in the /web/MANGA/cgi-bin/api.cgi file at a specific offset, indicating a precise location for the flaw. The vulnerability requires the attacker to have valid authentication credentials but does not require any additional user interaction, making it a direct threat once credentials are compromised or obtained. The CVSS v3.1 base score is 7.2, with vector AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, indicating network attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported, the potential for full device compromise is significant, as command injection can lead to arbitrary code execution, enabling attackers to manipulate device behavior, intercept or redirect network traffic, or disrupt network services. This vulnerability is particularly critical for organizations relying on Peplink Surf SOHO HW1 devices for secure network edge connectivity or VPN termination.

Potential Impact

For European organizations, exploitation of CVE-2023-35193 could result in severe operational and security consequences. The ability to execute arbitrary OS commands on Peplink Surf SOHO HW1 devices can lead to unauthorized access to sensitive network segments, interception or manipulation of data in transit, and disruption of critical network services. This is especially impactful for small to medium enterprises and branch offices using these devices as VPN gateways or network routers. Compromise could facilitate lateral movement within corporate networks, data exfiltration, or deployment of ransomware. Additionally, the loss of device availability could interrupt business continuity. Given the high confidentiality, integrity, and availability impacts, organizations in sectors such as finance, healthcare, government, and critical infrastructure in Europe face elevated risks. The requirement for authentication reduces the attack surface but also highlights the importance of strong credential management and access controls. The absence of known exploits in the wild suggests a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

To mitigate CVE-2023-35193, European organizations should implement the following specific measures: 1) Monitor Peplink’s official channels for firmware updates or patches addressing this vulnerability and apply them promptly once available. 2) Restrict management interface access to trusted networks and IP addresses using firewall rules and VPNs to reduce exposure. 3) Enforce strong authentication mechanisms, including complex passwords and multi-factor authentication, to prevent unauthorized access to device management. 4) Regularly audit and rotate credentials used for device administration to minimize risk from credential compromise. 5) Implement network segmentation to isolate Peplink devices from critical internal systems, limiting potential lateral movement. 6) Deploy intrusion detection/prevention systems (IDS/IPS) to monitor for anomalous authenticated HTTP requests targeting the api.cgi endpoint. 7) Conduct regular security assessments and penetration testing focusing on network edge devices to identify and remediate similar vulnerabilities. 8) Maintain comprehensive logging and alerting on device management activities to detect suspicious behavior early. These steps go beyond generic advice by focusing on access control hardening, monitoring, and proactive patch management tailored to the specific device and vulnerability context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-06-14T20:41:25.820Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a53242a90255b94da668a

Added to database: 11/4/2025, 7:25:24 PM

Last enriched: 11/4/2025, 8:19:46 PM

Last updated: 11/6/2025, 9:59:21 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats