CVE-2023-51217: n/a in n/a
An issue discovered in TenghuTOS TWS-200 firmware version:V4.0-201809201424 allows a remote attacker to execute arbitrary code via crafted command on the ping page component.
AI Analysis
Technical Summary
CVE-2023-51217 is a high-severity remote code execution (RCE) vulnerability affecting the firmware version V4.0-201809201424 of TenghuTOS TWS-200 devices. The vulnerability arises from improper input validation on the ping page component, allowing a remote attacker with low privileges (PR:L) to execute arbitrary commands by crafting malicious input. The vulnerability is classified under CWE-78, which corresponds to OS Command Injection, indicating that the attacker can inject and execute operating system commands. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and unchanged scope (S:U). Exploitation does not require user interaction but does require some level of privileges, which suggests the attacker must have some authenticated access or limited privileges on the device. No patches or vendor advisories are currently available, and no known exploits have been reported in the wild yet. The vulnerability could allow attackers to fully compromise affected devices, potentially leading to unauthorized control, data theft, or disruption of services.
Potential Impact
For European organizations, especially those utilizing TenghuTOS TWS-200 devices in their network infrastructure, this vulnerability poses a significant risk. Successful exploitation could lead to full device compromise, enabling attackers to execute arbitrary commands remotely. This could result in unauthorized access to sensitive data, disruption of network services, or use of compromised devices as pivot points for further attacks within the organization. Given the high confidentiality, integrity, and availability impacts, critical infrastructure, telecommunications, and enterprises relying on these devices could face operational disruptions and data breaches. The requirement for low privileges to exploit means insider threats or attackers who have gained limited access could escalate their control rapidly. The lack of available patches increases exposure time, making timely mitigation essential to reduce risk.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement the following specific mitigations: 1) Restrict access to the management interfaces of TenghuTOS TWS-200 devices to trusted networks and IP addresses only, using network segmentation and firewall rules. 2) Enforce strong authentication mechanisms and monitor for unusual login attempts to detect potential unauthorized access. 3) Disable or restrict the ping page component or any web interface features that are not essential to reduce the attack surface. 4) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection capable of identifying command injection attempts targeting these devices. 5) Regularly audit device configurations and logs for signs of exploitation or suspicious activity. 6) Plan for rapid deployment of vendor patches once available and maintain an inventory of affected devices for prioritized remediation. 7) Consider isolating vulnerable devices from critical network segments until the vulnerability is addressed.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2023-51217: n/a in n/a
Description
An issue discovered in TenghuTOS TWS-200 firmware version:V4.0-201809201424 allows a remote attacker to execute arbitrary code via crafted command on the ping page component.
AI-Powered Analysis
Technical Analysis
CVE-2023-51217 is a high-severity remote code execution (RCE) vulnerability affecting the firmware version V4.0-201809201424 of TenghuTOS TWS-200 devices. The vulnerability arises from improper input validation on the ping page component, allowing a remote attacker with low privileges (PR:L) to execute arbitrary commands by crafting malicious input. The vulnerability is classified under CWE-78, which corresponds to OS Command Injection, indicating that the attacker can inject and execute operating system commands. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and unchanged scope (S:U). Exploitation does not require user interaction but does require some level of privileges, which suggests the attacker must have some authenticated access or limited privileges on the device. No patches or vendor advisories are currently available, and no known exploits have been reported in the wild yet. The vulnerability could allow attackers to fully compromise affected devices, potentially leading to unauthorized control, data theft, or disruption of services.
Potential Impact
For European organizations, especially those utilizing TenghuTOS TWS-200 devices in their network infrastructure, this vulnerability poses a significant risk. Successful exploitation could lead to full device compromise, enabling attackers to execute arbitrary commands remotely. This could result in unauthorized access to sensitive data, disruption of network services, or use of compromised devices as pivot points for further attacks within the organization. Given the high confidentiality, integrity, and availability impacts, critical infrastructure, telecommunications, and enterprises relying on these devices could face operational disruptions and data breaches. The requirement for low privileges to exploit means insider threats or attackers who have gained limited access could escalate their control rapidly. The lack of available patches increases exposure time, making timely mitigation essential to reduce risk.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement the following specific mitigations: 1) Restrict access to the management interfaces of TenghuTOS TWS-200 devices to trusted networks and IP addresses only, using network segmentation and firewall rules. 2) Enforce strong authentication mechanisms and monitor for unusual login attempts to detect potential unauthorized access. 3) Disable or restrict the ping page component or any web interface features that are not essential to reduce the attack surface. 4) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection capable of identifying command injection attempts targeting these devices. 5) Regularly audit device configurations and logs for signs of exploitation or suspicious activity. 6) Plan for rapid deployment of vendor patches once available and maintain an inventory of affected devices for prioritized remediation. 7) Consider isolating vulnerable devices from critical network segments until the vulnerability is addressed.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-12-18T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683dbfa5182aa0cae24982b5
Added to database: 6/2/2025, 3:13:41 PM
Last enriched: 7/3/2025, 5:02:09 PM
Last updated: 7/31/2025, 11:22:23 AM
Views: 11
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.