Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-50382: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in LevelOne WBR-6013

0
High
VulnerabilityCVE-2023-50382cvecve-2023-50382cwe-78
Published: Mon Jul 08 2024 (07/08/2024, 15:22:23 UTC)
Source: CVE Database V5
Vendor/Project: LevelOne
Product: WBR-6013

Description

Three os command injection vulnerabilities exist in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This command injection is related to the `peerPin` request's parameter.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:20:07 UTC

Technical Analysis

CVE-2023-50382 is an OS command injection vulnerability identified in the LevelOne WBR-6013 router, which uses the Realtek rtl819x Jungle SDK version 3.4.11. The vulnerability exists in the boa web server's formWsc functionality, specifically related to the 'peerPin' parameter in HTTP requests. Improper neutralization of special elements in this parameter allows an attacker to inject arbitrary operating system commands. Exploitation involves sending a crafted sequence of HTTP requests to the device's management interface, which can lead to full command execution on the underlying system. The CVSS 3.1 score of 7.2 reflects a high severity, with network attack vector (AV:N), low attack complexity (AC:L), but requiring privileges (PR:H) and no user interaction (UI:N). The impact includes potential full compromise of the router, enabling attackers to manipulate network traffic, intercept data, or pivot into internal networks. Although no public exploits are currently reported, the vulnerability's nature and ease of exploitation once authenticated make it a critical concern. The affected firmware version is RER4_A_v3411b_2T2R_LEV_09_170623. No patches are currently linked, indicating that users must monitor vendor advisories closely. The vulnerability is categorized under CWE-78, highlighting improper input validation leading to OS command injection.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for those relying on LevelOne WBR-6013 routers in their network infrastructure. Successful exploitation can lead to unauthorized command execution, resulting in full device compromise. This jeopardizes confidentiality by exposing sensitive network traffic and credentials, integrity by allowing attackers to alter configurations or inject malicious payloads, and availability by potentially disrupting network connectivity. Given the router's role as a gateway device, attackers could use it as a foothold to launch further attacks within corporate networks or critical infrastructure. The requirement for authentication reduces the attack surface but does not eliminate risk, as credential theft or insider threats could facilitate exploitation. The absence of known exploits in the wild currently provides a window for mitigation, but the vulnerability's characteristics suggest it could be weaponized rapidly once publicized. European entities in sectors such as telecommunications, government, and industrial control systems that deploy these routers are particularly vulnerable.

Mitigation Recommendations

1. Immediately inventory all LevelOne WBR-6013 devices and verify firmware versions to identify affected units. 2. Restrict access to the router's management interface to trusted networks and IP addresses only, preferably via VPN or secure management channels. 3. Enforce strong authentication mechanisms and regularly update credentials to reduce risk of credential compromise. 4. Monitor network traffic for unusual HTTP requests targeting the 'peerPin' parameter or other suspicious patterns indicative of exploitation attempts. 5. Apply vendor firmware updates or patches as soon as they become available; if no official patch exists, consider temporary mitigations such as disabling vulnerable services or isolating affected devices. 6. Implement network segmentation to limit the impact of a compromised router on critical internal systems. 7. Conduct regular security assessments and penetration tests focusing on network edge devices to detect similar vulnerabilities. 8. Educate network administrators about this vulnerability and ensure incident response plans include scenarios involving router compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-12-07T15:53:58.264Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a3b5fff58c9332ff09302

Added to database: 11/4/2025, 5:43:59 PM

Last enriched: 11/4/2025, 6:20:07 PM

Last updated: 11/5/2025, 2:06:22 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats