Ricon Industrial Cellular Router S9922XL Remote Command Execution

Title: Ricon Industrial Cellular Router S9922XL Remote Command Execution
Advisory ID: ZSL-2021-5653
Type: Local/Remote
Impact: System Access, DoS
Risk: (4/5)
Release Date: 04.07.2021
Summary
S9922L series LTE router is designed and manufactured by Ricon Mobile Inc., it based on 3G/LTE cellular network technology with industrial class quality. With its embedded cellular module, it widely used in multiple case like ATM connection, remote office security connection, data collection, etc.

The S9922XL-LTE is a mobile network router based on 4G/4.5G, WiFi and VPN technologies. Powerful 64-bit Processor and integrated real-time operating system specially developed by Ricon Mobile. S9922XL is widely used in many areas such as intelligent transportation, scada, POS, industrial automation, telemetry, finance, environmental protection.
Description
The router suffers from an authenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands as the admin (root) user via the 'ping_server_ip' POST parameter. Also vulnerable to Heartbleed.
Vendor
Ricon Mobile Inc. - https://www.riconmobile.com
Affected Version
Model: S9922XL and S9922L
Firmware: 16.10.3
Tested On
GNU/Linux 2.6.36 (mips)
WEB-ROUTER
Vendor Status
[02.07.2021] Vulnerability discovered.
[02.07.2021] Vendor contacted.
[03.07.2021] No response from the vendor.
[04.07.2021] Public security advisory released.
PoC
ricon_cmdinj.py
Credits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>
References
[1] https://www.exploit-db.com/exploits/50096
[2] https://packetstormsecurity.com/files/163390/
[3] https://cxsecurity.com/issue/WLB-2021070038
[4] https://exchange.xforce.ibmcloud.com/vulnerabilities/204901
Changelog
[04.07.2021] - Initial release
[07.07.2021] - Added reference [1] and [2]
Contact
Zero Science Lab

Web: https://www.zeroscience.mk
e-mail: lab@zeroscience.mk