CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
Telesquare SKT LTE Router SDT-CS3B1 version 1.2.0 contains an arbitrary file upload vulnerability that allows unauthenticated attackers to upload malicious content by exploiting enabled WebDAV HTTP methods. Attackers can use PUT, DELETE, MKCOL, MOVE, COPY, and PROPPATCH methods to upload executable code, delete files, or manipulate server content for remote code execution or denial of service.
Analysis
An unauthenticated arbitrary file upload vulnerability in Telesquare SKT LTE Router SDT-CS3B1 version 1.2.0 allows remote attackers to upload malicious files and execute code through improperly enabled WebDAV HTTP methods. Attackers can achieve remote code execution or denial of service without any authentication, making this a critical risk for exposed devices. Multiple proof-of-concept exploits are publicly available through security research publications.
Technical Context
The vulnerability stems from improperly configured WebDAV (Web Distributed Authoring and Versioning) implementation on the Telesquare SDT-CS3B1 LTE router running firmware version 1.2.0. WebDAV extends HTTP with methods like PUT, DELETE, MKCOL, MOVE, COPY, and PROPPATCH that enable file manipulation capabilities. The root cause (CWE-434: Unrestricted Upload of File with Dangerous Type) indicates the router fails to properly validate uploaded content or restrict access to these dangerous HTTP methods. The CPE identifier (cpe:2.3:a:telesquare:sdt-cs3b1:*:*:*:*:*:*:*:*) confirms this affects the SDT-CS3B1 model specifically.
Affected Products
Telesquare SKT LTE Router model SDT-CS3B1 running firmware version 1.2.0. The CPE string indicates all configurations of this specific model are affected. According to ENISA EUVD (ID: EUVD-2017-18941), only version 1.2.0 is confirmed vulnerable, though the generic CPE suggests uncertainty about other versions.
Remediation
No patch information is available in the provided references. Immediate mitigation steps include: 1) Disable WebDAV functionality if possible through router configuration, 2) Implement network segmentation to prevent direct internet access to the management interface, 3) Deploy a web application firewall to block WebDAV methods (PUT, DELETE, MKCOL, MOVE, COPY, PROPPATCH), 4) Contact Telesquare for firmware updates or replacement options. The ZeroScience advisory (https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5446.php) may contain additional technical details for validation and mitigation.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2017-18941