Skip to main content

CVE-2023-49255: CWE-306 Missing Authentication for Critical Function in Hongdian H8951-4G-ESP

Critical
VulnerabilityCVE-2023-49255cvecve-2023-49255cwe-306
Published: Fri Jan 12 2024 (01/12/2024, 14:23:53 UTC)
Source: CVE Database V5
Vendor/Project: Hongdian
Product: H8951-4G-ESP

Description

The router console is accessible without authentication at "data" field, and while a user needs to be logged in in order to modify the configuration, the session state is shared. If any other user is currently logged in, the anonymous user can execute commands in the context of the authenticated one. If the logged in user has administrative privileges, it is possible to use webadmin service configuration commands to create a new admin user with a chosen password.

AI-Powered Analysis

AILast updated: 07/04/2025, 14:26:54 UTC

Technical Analysis

CVE-2023-49255 is a critical vulnerability identified in the Hongdian H8951-4G-ESP router, classified under CWE-306 (Missing Authentication for Critical Function). The core issue lies in the router's console interface, specifically at the 'data' field, which is accessible without any authentication. While modifying the router's configuration requires a logged-in user session, the vulnerability arises because the session state is shared among users. This means that if an authenticated user with administrative privileges is logged in, an unauthenticated or anonymous user can exploit this shared session state to execute commands with the same privileges as the authenticated user. This includes the ability to use the webadmin service configuration commands to create new administrative users with chosen passwords, effectively granting full control over the device to an attacker without needing to authenticate. The vulnerability has a CVSS 3.1 score of 9.8, indicating a critical severity level, with attack vector being network-based, no privileges or user interaction required, and full impact on confidentiality, integrity, and availability. No public exploits are currently known in the wild, but the nature of the flaw makes it highly exploitable remotely. The vulnerability was published on January 12, 2024, and affects the Hongdian H8951-4G-ESP router, a device likely used in industrial or enterprise environments given the vendor's profile. The lack of authentication on critical functions combined with session state sharing represents a severe design flaw that can lead to complete device takeover and persistent unauthorized access.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on Hongdian H8951-4G-ESP routers in their network infrastructure. The ability for an unauthenticated attacker to gain administrative access can lead to full compromise of the affected routers, enabling attackers to intercept, modify, or disrupt network traffic, deploy malware, or use the device as a pivot point for further attacks within the network. This can severely impact confidentiality by exposing sensitive data, integrity by allowing unauthorized configuration changes, and availability by potentially disabling network services. Critical infrastructure operators, industrial control systems, and enterprises using these routers could face operational disruptions, data breaches, and compliance violations under GDPR and other regulations. The shared session state flaw also means that even legitimate users logged into the device are at risk of session hijacking, increasing the attack surface. Given the router’s role in 4G connectivity, organizations relying on cellular backup or primary connections may experience outages or data interception. The absence of known exploits in the wild does not reduce the urgency due to the ease of exploitation and critical impact.

Mitigation Recommendations

Immediate mitigation steps include isolating the affected Hongdian H8951-4G-ESP routers from untrusted networks to limit exposure. Network segmentation should be enforced to restrict access to the router’s management interface only to trusted administrative hosts. Administrators should monitor network traffic for unusual access patterns or unauthorized configuration changes. Since no patches are currently available, organizations should consider replacing affected devices with alternatives from vendors with a stronger security track record. If replacement is not immediately feasible, implementing strict firewall rules to block access to the router’s webadmin interface from external networks is critical. Additionally, enforcing multi-factor authentication (MFA) on management interfaces, if supported, can reduce risk. Regularly auditing user sessions and logs for signs of session hijacking or unauthorized access attempts is recommended. Vendors and users should engage with Hongdian to prioritize the release of a security patch addressing the authentication and session management flaws. Finally, organizations should update their incident response plans to include scenarios involving router compromise and ensure backups of router configurations are maintained securely.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERT-PL
Date Reserved
2023-11-24T11:53:46.294Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f034a182aa0cae27e65f6

Added to database: 6/3/2025, 2:14:34 PM

Last enriched: 7/4/2025, 2:26:54 PM

Last updated: 8/2/2025, 12:49:03 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats