This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Code Injection via `ipAddr` parameter in `system_log.cgi`. π₯ **Consequences**: Remote Code Execution (RCE) with **root privileges**. Attackers can fully compromise the device.
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: Lack of input validation/sanitization on the `ipAddr` parameter. β οΈ **Flaw**: Allows command injection in the ping/diagnosis function. (CWE not specified in data).
Q3Who is affected? (Versions/Components)
π¦ **Affected Products**: Seowon Intech **SLC-130** and **SLR-120S** (including SLR-120S42G, D42G, T42G). π **Status**: All versions vulnerable.
Q4What can hackers do? (Privileges/Data)
π **Privileges**: **Root** level access. π΅οΈ **Action**: Execute arbitrary commands. π **Data**: Full control over the router's OS and network traffic.
π£ **Public Exp?**: **YES**. π **Proof**: Multiple PoCs available on GitHub (Al1ex, TAPESH-TEAM) and Exploit-DB. π **Tool**: Python scripts available for easy RCE.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for `system_log.cgi` endpoint. π§ͺ **Test**: Send malicious `ipAddr` payload. π‘ **Scanner**: Use Nuclei templates (`CVE-2020-17456.yaml`) for automated detection.
π§ **Workaround**: Block external access to `system_log.cgi`. π **Mitigation**: Restrict web management interface to LAN only. π« **Disable**: If possible, disable the diagnosis/ping feature in web UI.
Q10Is it urgent? (Priority Suggestion)
π₯ **Urgency**: **CRITICAL**. π¨ **Priority**: **P1**. Unauthenticated RCE with root access is a severe threat. Patch or isolate immediately!