CVE-2017-20224

Telesquare · SKT LTE Router SDT-CS3B1

An unauthenticated arbitrary file upload vulnerability in the Telesquare SDT-CS3B1 router allows attackers to execute remote code or delete files by exploiting enabled WebDAV HTTP methods.

Executive summary

The Telesquare SKT LTE Router contains a critical vulnerability allowing unauthenticated attackers to upload and execute malicious code, potentially leading to full device takeover.

Vulnerability

The device improperly handles WebDAV HTTP methods (PUT, MOVE, PROPPATCH), allowing an unauthenticated attacker to upload arbitrary files to the server. This enables the execution of malicious scripts or the deletion of critical system files.

Business impact

The impact is severe, as it grants attackers the ability to achieve Remote Code Execution (RCE) on the router. This can lead to persistent network eavesdropping, denial of service, or using the compromised router as a pivot point to attack the internal network. The CVSS score of 9.8 underscores the maximum risk associated with unauthenticated remote access.

Remediation

Immediate Action: Apply the latest firmware updates provided by Telesquare to disable unauthorized WebDAV methods or patch the file upload logic.

Proactive Monitoring: Monitor network traffic for unusual HTTP methods like PUT or MOVE directed at the router's management interface and review logs for unauthorized file creations.

Compensating Controls: Disable the WebDAV service if it is not required for business operations and restrict access to the router's web interface using a firewall or VPN.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability represents a high-priority risk to network infrastructure. Administrators should immediately update the router firmware to a secure version. If an update is unavailable, the management interface must be isolated from the public internet and WebDAV functionality should be disabled to prevent remote compromise.