CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Lifecycle Timeline
4Description
Telesquare SKT LTE Router SDT-CS3B1 software version 1.2.0 contains an unauthenticated remote reboot vulnerability that allows attackers to trigger device reboot without authentication. Attackers can send POST requests to the lte.cgi endpoint with the Command=Reboot parameter to cause denial of service by forcing the router to restart.
Analysis
An unauthenticated remote reboot vulnerability exists in the Telesquare SKT LTE Router SDT-CS3B1 firmware version 1.2.0, allowing attackers to trigger device restarts without any authentication by sending specially crafted POST requests to the lte.cgi endpoint. This vulnerability has a publicly available proof-of-concept exploit and enables denial of service attacks against affected routers. The vulnerability has been assigned a high CVSS score of 7.5 due to the complete availability impact and lack of authentication requirements.
Technical Context
The vulnerability affects the Telesquare SKT LTE Router model SDT-CS3B1 running firmware version 1.2.0, as identified by CPE string cpe:2.3:a:telesquare:sdt-cs3b1:*:*:*:*:*:*:*:*. The root cause is CWE-306 (Missing Authentication for Critical Function), where the lte.cgi endpoint accepts POST requests with the 'Command=Reboot' parameter without verifying the sender's identity. This CGI script appears to be a management interface that should require authentication but fails to implement any access controls, allowing anyone who can reach the router's web interface to trigger administrative actions.
Affected Products
Telesquare SKT LTE Router model SDT-CS3B1 running firmware version 1.2.0. According to ENISA EUVD data, specifically version 'SDT-CS3B1 1.2.0' is confirmed vulnerable. No information about other firmware versions is available in the provided intelligence, though the CPE wildcard suggests potential broader impact requiring vendor clarification.
Remediation
No patch information or updated firmware version is mentioned in any of the provided references. Primary mitigation involves restricting network access to the router's management interface through firewall rules or access control lists. Organizations should: 1) Limit access to the lte.cgi endpoint to trusted IP addresses only, 2) Place the router management interface on a separate management VLAN, 3) Contact Telesquare for firmware updates addressing this vulnerability, 4) Monitor for unusual reboot patterns that could indicate exploitation attempts. The VulnCheck advisory (https://www.vulncheck.com/advisories/telesquare-skt-lte-router-sdt-cs3b1-unauthenticated-remote-reboot) may contain additional vendor-specific guidance.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2017-18938