CVE-2024-44667: n/a
Shenzhen Haichangxing Technology Co., Ltd HCX H822 4G LTE Router M7628NNxISPxUIv2_v1.0.1557.15.35_P0 is vulnerable to Incorrect Access Control. Unauthenticated factory mode reset and command injection leads to information exposure and root shell access.
AI Analysis
Technical Summary
CVE-2024-44667 is a vulnerability classified under CWE-863 (Incorrect Access Control) affecting the Shenzhen Haichangxing Technology HCX H822 4G LTE Router, specifically the M7628NNxISPxUIv2_v1.0.1557.15.35_P0 firmware version. The flaw permits unauthenticated attackers to access a factory mode reset function and perform command injection attacks. This is possible due to insufficient access control mechanisms protecting critical device functions. Exploitation can be performed remotely over an adjacent network (AV:A), without user interaction (UI:N), and with low attack complexity (AC:L), but requires low privileges (PR:L), likely meaning access to the local network or a certain network segment. Successful exploitation results in high impact on confidentiality, integrity, and availability (C:H/I:H/A:H), including exposure of sensitive device information and obtaining root shell access, effectively compromising the device. No patches or known exploits are currently reported, but the severity and potential impact warrant urgent attention. The vulnerability could be leveraged for persistent device compromise, network pivoting, or disruption of LTE services.
Potential Impact
The vulnerability poses a significant risk to organizations relying on the Shenzhen Haichangxing HCX H822 4G LTE Router for network connectivity. Attackers gaining root shell access can fully control the device, leading to data leakage, unauthorized network access, and potential disruption of LTE services. This could impact confidentiality by exposing sensitive configuration and user data, integrity by allowing malicious modifications to device firmware or settings, and availability by enabling denial-of-service conditions through device resets or crashes. Critical infrastructure, telecom providers, and enterprises using these routers in their network edge or remote sites could face operational disruptions and increased attack surface for lateral movement. The lack of authentication for factory reset and command injection increases the risk of automated or wormable attacks within local networks.
Mitigation Recommendations
1. Immediately restrict network access to the affected router’s management interfaces by implementing strict firewall rules and network segmentation, limiting access to trusted administrators only. 2. Disable or restrict factory mode reset functionality if possible, or monitor and alert on any invocation of this feature. 3. Employ network intrusion detection systems (NIDS) to detect anomalous command injection attempts or unusual device resets. 4. Regularly audit device configurations and logs for signs of compromise or unauthorized access. 5. Engage with the vendor for firmware updates or patches; if unavailable, consider replacing affected devices with models from vendors with active security support. 6. Implement strong physical security controls to prevent local network access by unauthorized personnel. 7. Educate network administrators about this vulnerability and enforce strict credential management and access policies. 8. Consider deploying endpoint detection and response (EDR) solutions on connected systems to detect lateral movement attempts originating from compromised routers.
Affected Countries
China, India, Russia, Vietnam, Indonesia, Thailand, Malaysia, Philippines, Brazil, South Africa
CVE-2024-44667: n/a
Description
Shenzhen Haichangxing Technology Co., Ltd HCX H822 4G LTE Router M7628NNxISPxUIv2_v1.0.1557.15.35_P0 is vulnerable to Incorrect Access Control. Unauthenticated factory mode reset and command injection leads to information exposure and root shell access.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-44667 is a vulnerability classified under CWE-863 (Incorrect Access Control) affecting the Shenzhen Haichangxing Technology HCX H822 4G LTE Router, specifically the M7628NNxISPxUIv2_v1.0.1557.15.35_P0 firmware version. The flaw permits unauthenticated attackers to access a factory mode reset function and perform command injection attacks. This is possible due to insufficient access control mechanisms protecting critical device functions. Exploitation can be performed remotely over an adjacent network (AV:A), without user interaction (UI:N), and with low attack complexity (AC:L), but requires low privileges (PR:L), likely meaning access to the local network or a certain network segment. Successful exploitation results in high impact on confidentiality, integrity, and availability (C:H/I:H/A:H), including exposure of sensitive device information and obtaining root shell access, effectively compromising the device. No patches or known exploits are currently reported, but the severity and potential impact warrant urgent attention. The vulnerability could be leveraged for persistent device compromise, network pivoting, or disruption of LTE services.
Potential Impact
The vulnerability poses a significant risk to organizations relying on the Shenzhen Haichangxing HCX H822 4G LTE Router for network connectivity. Attackers gaining root shell access can fully control the device, leading to data leakage, unauthorized network access, and potential disruption of LTE services. This could impact confidentiality by exposing sensitive configuration and user data, integrity by allowing malicious modifications to device firmware or settings, and availability by enabling denial-of-service conditions through device resets or crashes. Critical infrastructure, telecom providers, and enterprises using these routers in their network edge or remote sites could face operational disruptions and increased attack surface for lateral movement. The lack of authentication for factory reset and command injection increases the risk of automated or wormable attacks within local networks.
Mitigation Recommendations
1. Immediately restrict network access to the affected router’s management interfaces by implementing strict firewall rules and network segmentation, limiting access to trusted administrators only. 2. Disable or restrict factory mode reset functionality if possible, or monitor and alert on any invocation of this feature. 3. Employ network intrusion detection systems (NIDS) to detect anomalous command injection attempts or unusual device resets. 4. Regularly audit device configurations and logs for signs of compromise or unauthorized access. 5. Engage with the vendor for firmware updates or patches; if unavailable, consider replacing affected devices with models from vendors with active security support. 6. Implement strong physical security controls to prevent local network access by unauthorized personnel. 7. Educate network administrators about this vulnerability and enforce strict credential management and access policies. 8. Consider deploying endpoint detection and response (EDR) solutions on connected systems to detect lateral movement attempts originating from compromised routers.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-21T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6ce0b7ef31ef0b569c26
Added to database: 2/25/2026, 9:42:56 PM
Last enriched: 2/28/2026, 6:42:16 AM
Last updated: 4/12/2026, 7:51:16 AM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.