Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-46685: CWE-259: Use of Hard-coded Password in LevelOne WBR-6013

0
Critical
VulnerabilityCVE-2023-46685cvecve-2023-46685cwe-259
Published: Mon Jul 08 2024 (07/08/2024, 15:22:29 UTC)
Source: CVE Database V5
Vendor/Project: LevelOne
Product: WBR-6013

Description

A hard-coded password vulnerability exists in the telnetd functionality of LevelOne WBR-6013 RER4_A_v3411b_2T2R_LEV_09_170623. A set of specially crafted network packets can lead to arbitrary command execution.

AI-Powered Analysis

AILast updated: 11/04/2025, 22:10:31 UTC

Technical Analysis

CVE-2023-46685 is a critical security vulnerability identified in the LevelOne WBR-6013 router, specifically in the firmware version RER4_A_v3411b_2T2R_LEV_09_170623. The flaw stems from the use of a hard-coded password within the telnet daemon (telnetd) functionality. This hard-coded credential can be exploited by an attacker who crafts specific network packets targeting the telnet service, enabling them to bypass authentication mechanisms entirely. As a result, the attacker can execute arbitrary commands on the device remotely, gaining full control over the router. The vulnerability is classified under CWE-259, which relates to the use of hard-coded passwords, a well-known security anti-pattern that severely compromises device security. The CVSS v3.1 base score of 9.8 reflects the vulnerability's critical nature, with attack vector being network-based (AV:N), requiring no privileges (PR:N), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits have been reported in the wild, the simplicity of exploitation and the critical impact on device security make this a high-priority issue. The affected firmware version is specific, but devices running this version remain vulnerable until patched. The lack of an available patch at the time of publication increases the urgency for interim mitigations.

Potential Impact

For European organizations, this vulnerability presents a severe risk to network infrastructure security. Compromise of the LevelOne WBR-6013 router could lead to unauthorized access to internal networks, interception or manipulation of sensitive data, disruption of network services, and potential pivoting to other internal systems. Given the router’s role as a gateway device, attackers could establish persistent backdoors, exfiltrate confidential information, or launch further attacks such as ransomware or espionage campaigns. The critical severity and ease of exploitation mean that even less sophisticated attackers could leverage this vulnerability. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly at risk due to the potential impact on data confidentiality and service availability. Additionally, the vulnerability could undermine trust in network security and compliance with data protection regulations like GDPR if exploited.

Mitigation Recommendations

Immediate mitigation steps include disabling the telnet service on all affected LevelOne WBR-6013 devices to eliminate the attack vector. Network administrators should restrict access to management interfaces by implementing strict firewall rules and network segmentation, ensuring that only trusted hosts can communicate with the router. Monitoring network traffic for unusual or suspicious packets targeting telnet ports (typically TCP 23) can help detect exploitation attempts. Organizations should inventory their network devices to identify any running the vulnerable firmware version and prioritize their replacement or isolation. Since no official patch is currently available, contacting LevelOne support for guidance and updates is essential. Additionally, consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability once available. For long-term security, replace devices with models that follow secure development practices and avoid hard-coded credentials. Finally, maintain robust incident response plans to quickly address any compromise stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-11-30T13:18:22.344Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b5aff58c9332ff08e54

Added to database: 11/4/2025, 5:43:54 PM

Last enriched: 11/4/2025, 10:10:31 PM

Last updated: 11/5/2025, 3:27:58 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats