Skip to main content

CVE-2023-7209: CWE-404 Denial of Service in Uniway Router

High
VulnerabilityCVE-2023-7209cvecve-2023-7209cwe-404
Published: Sun Jan 07 2024 (01/07/2024, 09:00:06 UTC)
Source: CVE Database V5
Vendor/Project: Uniway
Product: Router

Description

A vulnerability was found in Uniway Router up to 2.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /boaform/device_reset.cgi of the component Device Reset Handler. The manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249758 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/04/2025, 01:40:45 UTC

Technical Analysis

CVE-2023-7209 is a critical vulnerability affecting Uniway Router devices running firmware version 2.0. The issue resides in the device reset handler component, specifically within the /boaform/device_reset.cgi endpoint. This vulnerability is classified under CWE-404, which corresponds to an improper resource shutdown or release, leading to a denial of service (DoS) condition. An attacker can remotely exploit this vulnerability without requiring any authentication or user interaction, by sending specially crafted requests to the vulnerable CGI endpoint. Successful exploitation results in the router becoming unresponsive or crashing, effectively disrupting network connectivity and availability. The vulnerability has been publicly disclosed, although no patches or vendor responses have been provided to date. The CVSS v3.1 base score is 7.5, indicating a high severity level, with the vector highlighting that the attack can be launched remotely (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts availability only (A:H) without affecting confidentiality or integrity. The lack of vendor response and absence of patches increases the risk for affected organizations, as attackers could develop exploits to cause network outages or degrade service reliability.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on Uniway routers in their network infrastructure. A successful DoS attack could disrupt critical business operations by causing network outages, impacting internet access, intranet connectivity, and potentially interrupting services dependent on continuous network availability. This could affect sectors such as finance, healthcare, manufacturing, and public services where network uptime is crucial. Additionally, the remote and unauthenticated nature of the exploit lowers the barrier for attackers, increasing the likelihood of opportunistic attacks or targeted disruption campaigns. The absence of vendor patches means organizations must rely on alternative mitigations, increasing operational complexity and risk exposure. Furthermore, denial of service attacks can be used as a smokescreen for other malicious activities, complicating incident response efforts.

Mitigation Recommendations

Given the lack of official patches, European organizations should implement the following specific mitigations: 1) Network segmentation: Isolate Uniway routers from critical network segments and sensitive systems to limit the blast radius of a potential DoS attack. 2) Access control: Restrict access to the /boaform/device_reset.cgi endpoint by implementing firewall rules or web application firewalls (WAFs) that block or rate-limit requests to this CGI path, especially from untrusted networks or the internet. 3) Monitoring and alerting: Deploy network monitoring tools to detect unusual traffic patterns or repeated requests targeting the vulnerable endpoint, enabling rapid detection of exploitation attempts. 4) Incident response planning: Prepare response playbooks for DoS scenarios involving Uniway routers, including fallback connectivity options and rapid device replacement strategies. 5) Vendor engagement: Continue efforts to contact Uniway for patch releases or official guidance, and consider alternative hardware vendors if the risk remains unmitigated. 6) Firmware upgrade policies: Regularly review and update router firmware when patches become available, and maintain an inventory of affected devices to prioritize remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-05T09:52:49.832Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc2182aa0cae27ff3f3

Added to database: 6/3/2025, 2:59:14 PM

Last enriched: 7/4/2025, 1:40:45 AM

Last updated: 8/9/2025, 12:03:38 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats