CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
Telesquare SKT LTE Router SDT-CS3B1 firmware version 1.2.0 contains an insecure direct object reference vulnerability that allows attackers to bypass authorization and access resources by manipulating user-supplied input parameters. Attackers can directly reference objects in the system to retrieve sensitive information and access functionalities without proper access controls.
Analysis
An insecure direct object reference vulnerability in Telesquare SKT LTE Router SDT-CS3B1 firmware version 1.2.0 allows remote attackers to bypass authentication and directly access sensitive resources by manipulating input parameters. With a publicly available proof-of-concept exploit and a critical CVSS score of 9.8, attackers can gain unauthorized access to sensitive information and system functionalities without any authentication or user interaction required.
Technical Context
The vulnerability affects the Telesquare SDT-CS3B1 LTE router, specifically firmware version 1.2.0 (CPE: cpe:2.3:a:telesquare:sdt-cs3b1:*:*:*:*:*:*:*:*). This is an insecure direct object reference (IDOR) vulnerability classified as CWE-639, which occurs when an application exposes direct references to internal objects like database keys or filenames in URLs or form parameters. Attackers can manipulate these references to access unauthorized data or functionality, effectively bypassing the router's authentication mechanisms.
Affected Products
Telesquare SKT LTE Router model SDT-CS3B1 running firmware version 1.2.0. The CPE identifier confirms this specific product line is affected. According to ENISA EUVD data, specifically version 1.2.0 of the SDT-CS3B1 firmware is vulnerable.
Remediation
No specific patch information is provided in the available references. Organizations should immediately contact Telesquare for an updated firmware version beyond 1.2.0. As an interim mitigation, affected routers should be placed behind additional security controls, access should be restricted to trusted IP addresses only, and network segmentation should be implemented to limit potential impact. Monitor router logs for suspicious access attempts and consider replacing the device if no patch is available.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2017-18939