CVE-2023-35194: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Peplink Surf SOHO HW1
An OS command injection vulnerability exists in the api.cgi cmd.mvpn.x509.write functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability is specifically for the `system` call in the file `/web/MANGA/cgi-bin/api.cgi` for firmware version 6.3.5 at offset `0x4bde44`.
AI Analysis
Technical Summary
CVE-2023-35194 is an OS command injection vulnerability identified in the Peplink Surf SOHO HW1 router firmware version 6.3.5, specifically within the api.cgi cmd.mvpn.x509.write functionality. The vulnerability stems from improper neutralization of special characters in input passed to the system call in the /web/MANGA/cgi-bin/api.cgi file, allowing an attacker to inject arbitrary OS commands. Exploitation requires the attacker to be authenticated to the device's HTTP management interface, but does not require further user interaction. By sending a specially crafted HTTP request, the attacker can execute commands on the underlying operating system, potentially leading to full device compromise. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The CVSS v3.1 score is 7.2, reflecting high severity due to network attack vector, low attack complexity, requirement for privileges, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability poses a significant risk to organizations using this device, especially in environments where these routers serve as critical network edge devices. The lack of an official patch at the time of publication necessitates immediate mitigation efforts to reduce exposure.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized command execution on Peplink Surf SOHO HW1 devices, potentially resulting in full device compromise. This could allow attackers to intercept or manipulate network traffic, disrupt network availability, or pivot into internal networks, severely impacting confidentiality, integrity, and availability of sensitive data and services. Given the device's role as a network edge router, exploitation could disrupt business operations, cause data breaches, or facilitate further lateral attacks. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, face heightened risks. The requirement for authentication limits exposure to some extent but does not eliminate risk, especially if credential management is weak or if attackers gain access through phishing or insider threats. The absence of known exploits currently provides a window for proactive defense, but the high severity score indicates that exploitation could have serious consequences.
Mitigation Recommendations
1. Immediately restrict access to the management interface of Peplink Surf SOHO HW1 devices to trusted networks and IP addresses only, using firewall rules or VPNs. 2. Enforce strong authentication mechanisms, including complex passwords and, if supported, multi-factor authentication to reduce risk of credential compromise. 3. Monitor device logs and network traffic for unusual authenticated HTTP requests targeting the api.cgi endpoint, especially those invoking cmd.mvpn.x509.write functionality. 4. Disable or limit the use of vulnerable API functionalities if possible until a vendor patch is released. 5. Regularly audit and rotate administrative credentials to minimize risk from leaked or reused passwords. 6. Engage with Peplink support or vendor channels to obtain and apply firmware updates or patches as soon as they become available. 7. Consider network segmentation to isolate vulnerable devices from critical assets. 8. Educate administrators on the risks of this vulnerability and ensure incident response plans include steps for potential exploitation scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2023-35194: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Peplink Surf SOHO HW1
Description
An OS command injection vulnerability exists in the api.cgi cmd.mvpn.x509.write functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability is specifically for the `system` call in the file `/web/MANGA/cgi-bin/api.cgi` for firmware version 6.3.5 at offset `0x4bde44`.
AI-Powered Analysis
Technical Analysis
CVE-2023-35194 is an OS command injection vulnerability identified in the Peplink Surf SOHO HW1 router firmware version 6.3.5, specifically within the api.cgi cmd.mvpn.x509.write functionality. The vulnerability stems from improper neutralization of special characters in input passed to the system call in the /web/MANGA/cgi-bin/api.cgi file, allowing an attacker to inject arbitrary OS commands. Exploitation requires the attacker to be authenticated to the device's HTTP management interface, but does not require further user interaction. By sending a specially crafted HTTP request, the attacker can execute commands on the underlying operating system, potentially leading to full device compromise. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The CVSS v3.1 score is 7.2, reflecting high severity due to network attack vector, low attack complexity, requirement for privileges, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability poses a significant risk to organizations using this device, especially in environments where these routers serve as critical network edge devices. The lack of an official patch at the time of publication necessitates immediate mitigation efforts to reduce exposure.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized command execution on Peplink Surf SOHO HW1 devices, potentially resulting in full device compromise. This could allow attackers to intercept or manipulate network traffic, disrupt network availability, or pivot into internal networks, severely impacting confidentiality, integrity, and availability of sensitive data and services. Given the device's role as a network edge router, exploitation could disrupt business operations, cause data breaches, or facilitate further lateral attacks. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, face heightened risks. The requirement for authentication limits exposure to some extent but does not eliminate risk, especially if credential management is weak or if attackers gain access through phishing or insider threats. The absence of known exploits currently provides a window for proactive defense, but the high severity score indicates that exploitation could have serious consequences.
Mitigation Recommendations
1. Immediately restrict access to the management interface of Peplink Surf SOHO HW1 devices to trusted networks and IP addresses only, using firewall rules or VPNs. 2. Enforce strong authentication mechanisms, including complex passwords and, if supported, multi-factor authentication to reduce risk of credential compromise. 3. Monitor device logs and network traffic for unusual authenticated HTTP requests targeting the api.cgi endpoint, especially those invoking cmd.mvpn.x509.write functionality. 4. Disable or limit the use of vulnerable API functionalities if possible until a vendor patch is released. 5. Regularly audit and rotate administrative credentials to minimize risk from leaked or reused passwords. 6. Engage with Peplink support or vendor channels to obtain and apply firmware updates or patches as soon as they become available. 7. Consider network segmentation to isolate vulnerable devices from critical assets. 8. Educate administrators on the risks of this vulnerability and ensure incident response plans include steps for potential exploitation scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-06-14T20:41:25.821Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a53242a90255b94da668e
Added to database: 11/4/2025, 7:25:24 PM
Last enriched: 11/4/2025, 8:19:29 PM
Last updated: 11/6/2025, 9:33:26 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchill Strong Testimonials
MediumCVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
MediumCVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
MediumCVE-2025-12471: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in nerdpressteam Hubbub Lite – Fast, free social sharing and follow buttons
MediumCVE-2025-9338: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in ASUS Armoury Crate
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.