Thursday, February 27, 2025
HomeCyber Security NewsEdgeRouter and AirCube miniupnpd Vulnerabilities Enable Attackers to Execute Arbitrary Code

EdgeRouter and AirCube miniupnpd Vulnerabilities Enable Attackers to Execute Arbitrary Code

Published on

SIEM as a Service

Follow Us on Google News

AirCube is a wireless access point device used in homes and Edge Routers are special routers manufactured by Ubiquiti that act at the network boundary and allow an internal network to connect to an external network.

MiniUPnPd (Mini Universal Plug aNd Play) is a small daemon that initiates the UPnP and NatPMP (Network Address Translation Port Mapping Protocol) for a device. These two services allow port redirection to any client on the network.

Recent reports from SSD suggest that MiniUPnPd service on the Aircube and Edge routers are vulnerable to an internal heap overflow that can lead potentially to execute arbitrary code.

CVE(s):

CVE-2023-31998: Heap Overflow in the miniupnpd leads to Arbitrary code execution

This vulnerability exists in the /etc/init.d/upnpd which exposes a dynamic TCP port to LAN clients, allowing threat actors to execute a heap overflow attack resulting in an arbitrary code execution.

The CVSS score and vector for this Edge Routers vulnerability are yet to be confirmed.

Vulnerability Details

Miniupnpd allows the configuration of NAT entries with a function called Internet Gateway Daemon. In Linux, the NAT entries are handled with the help of iptables or nftables. However, iptables used the function get_port_mappings_in_range function to get the external NAT entries and ports. 

Image: miniupnpd functionality diagram

The default allocation of array memory is set to 128 ports as the number of external port entries is not known in advance. If the entries exceed the number of port entries, the reallocation of memory is not updated accordingly, leading to a heap overflow.

SSD has published detailed information about this Edge Routers vulnerability.

Affected Products and Fixed Versions

A security advisory has also been published for this vulnerability.

Affected ProductsFixed in Versions
UPnP-enabled EdgeRouters running 2.0.9-hotfix.6 and earlier.Update affected EdgeRouters to 2.0.9-hotfix.7 or later.
UPnP-enabled Aircubes running 2.8.8 and earlier.Update affected Aircubes to 2.8.9 or later.

Users of these products are advised to upgrade to the latest versions to fix this vulnerability and prevent threat actors.

“AI-based email security measures Protect your business From Email Threats!” – .

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...