Industrial routers made by Chinese company Yifan are affected by several critical vulnerabilities that can expose organizations to attacks, Cisco’s Talos threat intelligence and research group reported on Wednesday.
The vendor was notified in late June and given more than 90 days to release patches. However, no fixes appear to have been released and Cisco has made public the technical details in accordance with its vulnerability disclosure policy.
A Talos researcher discovered over a dozen vulnerabilities in Yifan’s YF325 cellular router. According to the vendor, the device has been deployed in various fields, including self-service terminals, intelligent transportation, industrial automation, smart grid, water supply, finance, and point-of-sale systems.
A majority of the flaws found in the router have been assigned ‘critical severity’ ratings and the remaining have been classified as ‘high severity’.
Talos said the most serious of the security holes can be exploited to execute an arbitrary shell on the targeted router (CVE-2023-32632), change the admin credentials of the device and obtain root access (CVE-2023-24479), and leverage leftover debug credentials to access the device with admin privileges (CVE-2023-32645).
The remaining weaknesses can be exploited for arbitrary code/command execution and denial-of-service (DoS) attacks.
All vulnerabilities can be exploited by sending specially crafted network requests to the targeted device.
SecurityWeek has reached out to Yifan for comment and will update this article if the company responds.