Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-35194: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Peplink Surf SOHO HW1

0
High
VulnerabilityCVE-2023-35194cvecve-2023-35194cwe-78
Published: Wed Oct 11 2023 (10/11/2023, 15:16:55 UTC)
Source: CVE Database V5
Vendor/Project: Peplink
Product: Surf SOHO HW1

Description

An OS command injection vulnerability exists in the api.cgi cmd.mvpn.x509.write functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability is specifically for the `system` call in the file `/web/MANGA/cgi-bin/api.cgi` for firmware version 6.3.5 at offset `0x4bde44`.

AI-Powered Analysis

AILast updated: 11/04/2025, 20:19:29 UTC

Technical Analysis

CVE-2023-35194 is an OS command injection vulnerability identified in the Peplink Surf SOHO HW1 router firmware version 6.3.5, specifically within the api.cgi cmd.mvpn.x509.write functionality. The vulnerability stems from improper neutralization of special characters in input passed to the system call in the /web/MANGA/cgi-bin/api.cgi file, allowing an attacker to inject arbitrary OS commands. Exploitation requires the attacker to be authenticated to the device's HTTP management interface, but does not require further user interaction. By sending a specially crafted HTTP request, the attacker can execute commands on the underlying operating system, potentially leading to full device compromise. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The CVSS v3.1 score is 7.2, reflecting high severity due to network attack vector, low attack complexity, requirement for privileges, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability poses a significant risk to organizations using this device, especially in environments where these routers serve as critical network edge devices. The lack of an official patch at the time of publication necessitates immediate mitigation efforts to reduce exposure.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized command execution on Peplink Surf SOHO HW1 devices, potentially resulting in full device compromise. This could allow attackers to intercept or manipulate network traffic, disrupt network availability, or pivot into internal networks, severely impacting confidentiality, integrity, and availability of sensitive data and services. Given the device's role as a network edge router, exploitation could disrupt business operations, cause data breaches, or facilitate further lateral attacks. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, face heightened risks. The requirement for authentication limits exposure to some extent but does not eliminate risk, especially if credential management is weak or if attackers gain access through phishing or insider threats. The absence of known exploits currently provides a window for proactive defense, but the high severity score indicates that exploitation could have serious consequences.

Mitigation Recommendations

1. Immediately restrict access to the management interface of Peplink Surf SOHO HW1 devices to trusted networks and IP addresses only, using firewall rules or VPNs. 2. Enforce strong authentication mechanisms, including complex passwords and, if supported, multi-factor authentication to reduce risk of credential compromise. 3. Monitor device logs and network traffic for unusual authenticated HTTP requests targeting the api.cgi endpoint, especially those invoking cmd.mvpn.x509.write functionality. 4. Disable or limit the use of vulnerable API functionalities if possible until a vendor patch is released. 5. Regularly audit and rotate administrative credentials to minimize risk from leaked or reused passwords. 6. Engage with Peplink support or vendor channels to obtain and apply firmware updates or patches as soon as they become available. 7. Consider network segmentation to isolate vulnerable devices from critical assets. 8. Educate administrators on the risks of this vulnerability and ensure incident response plans include steps for potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-06-14T20:41:25.821Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a53242a90255b94da668e

Added to database: 11/4/2025, 7:25:24 PM

Last enriched: 11/4/2025, 8:19:29 PM

Last updated: 11/6/2025, 9:33:26 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats