A Proof-of-Concept (PoC) exploit for the CVE-2023-31998 vulnerability in Ubiquiti EdgeRouter has been publicly released, posing a risk to impacted devices. The heap overflow flaw affects Ubiquiti EdgeRouters and Aircubes, allowing potential execution of arbitrary code and disruption of UPnP service.
The vulnerability resides in the miniupnpd service and can be exploited by a LAN attacker. It affects EdgeRouters running versions 2.0.9-hotfix.6 and earlier, as well as AirCube firmware version 2.8.8 and earlier.
Vulnerability reporting firm SSD Secure Disclosure has published technical details of the vulnerability and developed a proof of concept, which was successfully tested on an EdgeRouter-X device that shares the same vulnerability.
Successful exploitation of the vulnerability requires specific configuration and vulnerability settings related to the miniupnpd service, including exposing a dynamic TCP port to LAN clients and allowing external NAT entries. The researchers warn that other networking devices relying on vulnerable versions of the MiniUPnPd service may also be affected.
Ubiquiti has addressed the vulnerability by releasing software updates. Users of EdgeRouters should update to version 2.0.9-hotfix.7 or later, while Aircube users should update to software version 2.8.9 or later. It is important for users to promptly apply these updates to mitigate the risk of exploitation.
Ubiquiti has stated that it is currently not aware of any attacks in the wild targeting this vulnerability.