ET WEB_SPECIFIC_APPS FXC AE1021 Series Router ntp.general.hostname Authenticated Command Injection Attempt (CVE-2023-49897)

SID: 2059881Rev: 151 views
Sourceet/open
CreatedFebruary 4, 2025
UpdatedFebruary 4, 2025
Classificationattempted-admin
alert http any any -> $HOME_NET any (msg:"ET WEB_SPECIFIC_APPS FXC AE1021 Series Router ntp.general.hostname Authenticated Command Injection Attempt (CVE-2023-49897)"; flow:established,to_server; http.method; content:"POST"; http.uri; bsize:15; content:"/cgi-bin/action"; http.request_body; content:"ntp.general.hostname|3d|"; fast_pattern; pcre:"/^[^\x26]*?(?:(?:\x3b|%3[Bb])|(?:\x0a|%0[Aa])|(?:\x60|%60)|(?:\x7c|%7[Cc])|(?:\x24|%24))+/R"; reference:url,www.akamai.com/blog/security-research/zero-day-vulnerability-spreading-mirai-patched; reference:cve,2023-49897; classtype:attempted-admin; sid:2059881; rev:1; metadata:affected_product FXC, attack_target Networking_Equipment, tls_state plaintext, created_at 2025_02_04, cve CVE_2023_49897, deployment Perimeter, deployment Internal, performance_impact Low, confidence High, signature_severity Major, tag Exploit, tag CISA_KEV, updated_at 2025_02_04, mitre_tactic_id TA0001, mitre_tactic_name Initial_Access, mitre_technique_id T1190, mitre_technique_name Exploit_Public_Facing_Application; target:dest_ip;)

Metadata

affected productFXC
attack targetNetworking_Equipment
tls stateplaintext
created at2025_02_04
deploymentInternal
performance impactLow
confidenceHigh
signature severityMajor
tagCISA_KEV
updated at2025_02_04
mitre tactic idTA0001
mitre tactic nameInitial_Access
mitre technique idT1190
mitre technique nameExploit_Public_Facing_Application

Comments (0)

Please sign in to leave a comment.
Sign in

No comments yet. Be the first to comment!