Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-50240: CWE-121: Stack-based Buffer Overflow in LevelOne WBR-6013

0
High
VulnerabilityCVE-2023-50240cvecve-2023-50240cwe-121
Published: Mon Jul 08 2024 (07/08/2024, 15:22:25 UTC)
Source: CVE Database V5
Vendor/Project: LevelOne
Product: WBR-6013

Description

Two stack-based buffer overflow vulnerabilities exist in the boa set_RadvdInterfaceParam functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This stack-based buffer overflow is related to the `AdvDefaultPreference` request's parameter.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:22:11 UTC

Technical Analysis

CVE-2023-50240 identifies two stack-based buffer overflow vulnerabilities in the boa set_RadvdInterfaceParam functionality of the Realtek rtl819x Jungle SDK version 3.4.11, which is embedded in the LevelOne WBR-6013 router firmware (version RER4_A_v3411b_2T2R_LEV_09_170623). The vulnerability is linked to improper input validation of the AdvDefaultPreference parameter within the router's network request handling code. An attacker with network access and elevated privileges can send a sequence of specially crafted requests to overflow the stack buffer, potentially overwriting the return address or other control data. This can lead to remote code execution (RCE) on the device, allowing the attacker to execute arbitrary code with the privileges of the vulnerable process. The CVSS 3.1 base score is 7.2, reflecting high severity due to network attack vector, low attack complexity, required privileges, and no user interaction. The impact includes full compromise of the device, enabling attackers to intercept, modify, or disrupt network traffic, pivot to internal networks, or launch further attacks. No public exploits or patches are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The affected firmware version is specific, indicating that devices running other versions may not be vulnerable, but similar Realtek SDK versions could share the flaw. The vulnerability is categorized under CWE-121, a classic stack-based buffer overflow, which is a well-known and critical class of memory corruption bugs.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to complete compromise of affected LevelOne WBR-6013 routers, undermining network security and potentially exposing sensitive data traversing these devices. Given the router’s role as a network gateway, attackers could intercept confidential communications, disrupt business operations through denial of service, or use the compromised device as a foothold for lateral movement within corporate networks. This risk is heightened in sectors relying on these devices for critical infrastructure or remote office connectivity. The vulnerability’s network-based attack vector means that attackers do not need physical access or user interaction, increasing the likelihood of remote exploitation. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, as public disclosure often leads to rapid development of exploit code. Organizations with limited patch management capabilities or those using outdated firmware are particularly vulnerable. Additionally, the vulnerability could be leveraged in targeted attacks against high-value European entities, especially where LevelOne devices are prevalent.

Mitigation Recommendations

Organizations should immediately inventory their network infrastructure to identify any LevelOne WBR-6013 devices running the affected firmware version RER4_A_v3411b_2T2R_LEV_09_170623. Until an official patch is released, restrict network access to the router’s management interfaces by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. Disable or restrict the use of the vulnerable boa set_RadvdInterfaceParam functionality if possible, or disable IPv6 router advertisement features if not required. Monitor network traffic for unusual or repeated requests targeting the AdvDefaultPreference parameter or related interfaces, using IDS/IPS systems with custom signatures. Employ network anomaly detection to identify potential exploitation attempts. Plan and prioritize firmware updates as soon as vendor patches become available, validating updates in test environments before deployment. Additionally, consider replacing affected devices with models from vendors with more timely security support if patching is delayed. Educate network administrators about the vulnerability and ensure that privileged credentials are protected to prevent attackers from gaining the required privileges for exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-12-05T17:29:57.557Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b5dff58c9332ff08ee0

Added to database: 11/4/2025, 5:43:57 PM

Last enriched: 11/4/2025, 6:22:11 PM

Last updated: 11/5/2025, 2:58:48 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats