Resources > research
RBS-2022-001 – NetModule Router Software (NRSW)
NetModule Router Software (NRSW) contains PHP type juggling flaws. With specially crafted HTTP requests, a remote attacker can bypass authentication and access the configuration file upload functionality and CLI interface.
PHP type juggling flaws in NetModule Route Software
Vendor / Product information
“The NetModule Router Software is the standard software on our mobile and stationary router products. It comes with a comprehensive set of network features and a user interface for integrators or end users.”
Vulnerable program details
Tested products and version:
Product: NetModule Router Software (NRSW)
Version:184.108.40.206, 220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199
Carsten Eiram, Flashpoint
NetModule Router Software (NRSW) contains vulnerabilities that are triggered as two PHP scripts accessible via the web-based management interface are vulnerable to PHP type juggling. This allows remote attackers to bypass authentication and access certain administrative functionality.
Please note that these vulnerabilities were discovered during audits of older firmware versions that are still used on multiple publicly accessible devices. The vendor addressed both issues in updated versions released at the end of 2018 without mention in the release changelogs. Based on conversations with the vendor, they were seemingly unaware that their code changes addressed these two vulnerabilities and were not trying to silently fix them.
/upload.php PHP Juggling Remote Authentication Bypass
NetModule Router Software (NRSW) contains a PHP type juggling flaw in the /upload.php script that is triggered as it fails to properly check the supplied password if passed as an array type. With a specially crafted HTTP request, a remote attacker can bypass authentication and access the configuration file upload functionality.
/cli.php PHP Juggling Remote Authentication Bypass
NetModule Router Software (NRSW) contains a PHP type juggling flaw in the /cli.php script that is triggered as it fails to properly check the supplied password if passed as an array type. With a specially crafted HTTP request, a remote attacker can bypass authentication and access the CLI interface.
The vulnerability in upload.php was addressed in version 188.8.131.52 by removing the vulnerable script. The vulnerability in cli.php was addressed in version 184.108.40.206 while fixing another issue.
As NetModule does not mention these critical vulnerability fixes in a security advisory or release changelogs, Flashpoint contacted the vendor. The hope was to encourage them to alert their customers e.g. via a security advisory to ensure that anyone still using an old, vulnerable version would become aware of the risk and upgrade to a fixed, supported version prior to publication of this report. The vendor has stated that they do not plan to issue a security advisory, as they only do that for supported releases. They further state that they already publish Discontinuation Notices and continuously ask customers to keep devices up to date and that customers still running old, unsupported releases, therefore, have knowingly accepted the risk.
It should be noted that multiple vulnerable devices have been found to be publicly accessible with e.g. one Danish company having more than 100 of them exposed on the Internet. Vulnerable devices are also accessible in many other countries. Anyone using these vulnerable versions are encouraged to immediately upgrade to a fixed version or ensure that they are no longer Internet accessible.
2022-03-28: Vulnerabilities discovered.
2022-05-30: Vendor contacted.
2022-05-30: Vendor acknowledges receipt of report.
2022-06-09: Alert sent to RBS VulnDB clients.
2022-07-05: Publication of this vulnerability report.