Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-50381: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in LevelOne WBR-6013

0
High
VulnerabilityCVE-2023-50381cvecve-2023-50381cwe-78
Published: Mon Jul 08 2024 (07/08/2024, 15:22:23 UTC)
Source: CVE Database V5
Vendor/Project: LevelOne
Product: WBR-6013

Description

Three os command injection vulnerabilities exist in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This command injection is related to the `targetAPSsid` request's parameter.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:20:24 UTC

Technical Analysis

CVE-2023-50381 identifies three OS command injection vulnerabilities within the boa web server's formWsc functionality embedded in the Realtek rtl819x Jungle SDK version 3.4.11, which is used by the LevelOne WBR-6013 router. The vulnerability arises from improper neutralization of special elements in the 'targetAPSsid' HTTP request parameter, allowing an attacker to inject arbitrary operating system commands. Exploitation requires sending a series of specially crafted HTTP requests to the device's management interface. The vulnerability is classified under CWE-78, indicating improper sanitization of OS command inputs. The CVSS v3.1 base score is 7.2 (high), reflecting network attack vector (AV:N), low attack complexity (AC:L), but requiring high privileges (PR:H) and no user interaction (UI:N). Successful exploitation compromises confidentiality, integrity, and availability by enabling remote command execution, potentially allowing attackers to manipulate device configurations, intercept or redirect traffic, or disrupt network services. Although no known exploits are currently observed in the wild, the vulnerability's nature and impact warrant urgent attention. The affected firmware version is RER4_A_v3411b_2T2R_LEV_09_170623. The lack of publicly available patches necessitates interim mitigations to reduce exposure.

Potential Impact

For European organizations, exploitation of CVE-2023-50381 could lead to severe network security breaches. Compromised routers can serve as entry points for lateral movement within corporate networks, enabling attackers to intercept sensitive communications, alter network configurations, or launch denial-of-service attacks. This is particularly critical for sectors relying on secure and stable network infrastructure, such as finance, healthcare, government, and critical infrastructure operators. The high severity score reflects the potential for full device compromise, risking data confidentiality, operational integrity, and service availability. Given the widespread use of Realtek chipsets in networking devices, organizations using LevelOne WBR-6013 or similar devices may face increased risk. The absence of known exploits in the wild currently reduces immediate threat but does not eliminate the risk of future exploitation, especially as proof-of-concept code may emerge. European entities with remote management enabled on these devices are especially vulnerable, as the attack vector is network-based and requires no user interaction.

Mitigation Recommendations

1. Immediately restrict access to the router’s management interface by limiting it to trusted internal networks or VPNs, preventing exposure to untrusted external networks. 2. Disable remote management features if not strictly necessary to reduce the attack surface. 3. Monitor network traffic for unusual HTTP requests targeting the 'targetAPSsid' parameter or other suspicious patterns indicative of command injection attempts. 4. Apply any vendor-provided firmware updates or patches as soon as they become available; maintain contact with LevelOne for patch release announcements. 5. If patching is delayed, consider deploying network-level protections such as web application firewalls (WAFs) or intrusion prevention systems (IPS) configured to detect and block command injection payloads targeting the vulnerable endpoints. 6. Conduct regular security audits of network devices to identify vulnerable firmware versions and replace or isolate affected hardware where feasible. 7. Educate network administrators about the risks of this vulnerability and ensure strict credential management to prevent privilege escalation that could facilitate exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-12-07T15:53:58.264Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b5fff58c9332ff092fc

Added to database: 11/4/2025, 5:43:59 PM

Last enriched: 11/4/2025, 6:20:24 PM

Last updated: 11/5/2025, 3:01:14 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats