During the security assessment of the Router firmware, it was observed that router login credentials of both web portal and Wi-Fi access point are stored in plain text in SPI flash memoey. Attacker can extract the login credentials, and which can be misused by attacker.
Vendor of the product: Hathway
Affected product:CM5100-511
Affected Version: 4.1.1.24
Vulnerability Score V3.1: 6.8 Medium AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:H
-
Power on the router and do the initial network reconnaissance using Nmap tool.
-
Teardown the router and locate the UART connection as shown in below Image. Connect the UART connection to serial console and check the initial boot sequence of router. Form initial boot sequence we got the hardware and firmware version information.
-
From Hardware PCB analysis it was observed that external flash IC(Winbond W25Q64JV) is connected back side, solder out the flash IC from PCB and using CH431A flash programmer dump the firmware.
-
After dumping the flash firmware,Perform the analysis of dumped binary file and we found that, suspicious login credentials with login name as ‘admin’ and with Wi-Fi access point name in plain text.
-
Open the dumped firmware in hex view to locate the Suspicious credential’s exact memory location in firmware.
-
We tried to login the web portal and Wi-Fi access point using suspensions credentials found in firmware and it logged in successfully.
-
Even though user changed default credentials, attacker can extract it from firmware by knowing the memory address and also credentials are stored in plain text.
Nitin Ronge(www.linkedin.com/in/nitin-ronge)
Anand Yadav(www.linkedin.com/in/anandyadav6962)