Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-50239: CWE-121: Stack-based Buffer Overflow in LevelOne WBR-6013

0
High
VulnerabilityCVE-2023-50239cvecve-2023-50239cwe-121
Published: Mon Jul 08 2024 (07/08/2024, 15:22:25 UTC)
Source: CVE Database V5
Vendor/Project: LevelOne
Product: WBR-6013

Description

Two stack-based buffer overflow vulnerabilities exist in the boa set_RadvdInterfaceParam functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the `interfacename` request's parameter.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:22:36 UTC

Technical Analysis

CVE-2023-50239 identifies two stack-based buffer overflow vulnerabilities in the boa set_RadvdInterfaceParam function of the Realtek rtl819x Jungle SDK v3.4.11, which is embedded in the LevelOne WBR-6013 router firmware version RER4_A_v3411b_2T2R_LEV_09_170623. The vulnerability stems from improper bounds checking of the 'interfacename' parameter in network requests, allowing an attacker to overflow the stack buffer. This overflow can corrupt the stack, potentially enabling remote code execution (RCE) on the affected device. The attack vector is network-based (AV:N), requiring high privileges (PR:H), but no user interaction (UI:N). The vulnerability affects confidentiality, integrity, and availability, as an attacker could execute arbitrary code, manipulate network traffic, or disrupt device operation. The Realtek rtl819x SDK is widely used in embedded networking devices, and the LevelOne WBR-6013 is a consumer and small business router model. Although no public exploits are currently known, the vulnerability's nature and CVSS score of 7.2 indicate a significant risk. The lack of available patches necessitates proactive defensive measures. The boa web server component handling router configuration is the attack surface, and the vulnerability is classified under CWE-121 (stack-based buffer overflow).

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and branch offices using LevelOne WBR-6013 routers, this vulnerability presents a serious risk of remote compromise. Successful exploitation could allow attackers to execute arbitrary code on the router, leading to full device takeover. This could result in interception or manipulation of network traffic, disruption of internet connectivity, and potential pivoting into internal networks. Confidential data could be exposed or altered, and network availability could be compromised. Given the router's role as a network gateway, the impact extends beyond the device itself to the broader organizational network. The vulnerability's network-based attack vector means that attackers can exploit it remotely without user interaction, increasing the threat surface. European organizations with limited patch management capabilities or those relying on legacy firmware versions are particularly vulnerable. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, as weaponization could occur rapidly after public disclosure.

Mitigation Recommendations

1. Immediately restrict network access to the LevelOne WBR-6013 management interfaces, especially from untrusted networks, using firewall rules and network segmentation. 2. Implement strict access controls and authentication mechanisms to limit who can send configuration requests to the router. 3. Monitor network traffic for unusual or malformed requests targeting the 'interfacename' parameter or the boa web server component. 4. Disable remote management features if not strictly necessary or restrict them to trusted IP addresses. 5. Regularly audit router firmware versions and configurations to identify devices running the vulnerable firmware (RER4_A_v3411b_2T2R_LEV_09_170623). 6. Engage with LevelOne or authorized vendors to obtain patches or firmware updates as soon as they become available. 7. Consider deploying network intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts targeting this vulnerability. 8. Educate network administrators about the vulnerability and the importance of timely updates and network hygiene. 9. Where feasible, replace vulnerable devices with models confirmed to be free from this vulnerability or supported with timely security updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-12-05T17:29:57.555Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b5dff58c9332ff08edc

Added to database: 11/4/2025, 5:43:57 PM

Last enriched: 11/4/2025, 6:22:36 PM

Last updated: 11/5/2025, 3:29:47 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats