Sploit.io - Search

Product: g-040w-q_firmware, version: g040wqr201207

CVE-2023-41350

Severity: HIGH

Description: Chunghwa Telecom NOKIA G-040W-Q has a vulnerability of insufficient measures to prevent multiple failed authentication attempts. An unauthenticated remote attacker can execute a crafted Javascript to expose captcha in page, making it very easy for bots to bypass the captcha check and more susceptible to brute force attacks.

CVSS Score: 7.5

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.000630000
  • Percentile: 0.193480000
  • Date: 2026-04-19

ExploitDB

No data available.

HackerOne Data

  • Rank: 9119
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Chunghwa Telecom NOKIA G-040W-Q - Versions: G040WQR201207

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability in the Chunghwa Telecom NOKIA G-040W-Q router, stemming from insufficient measures to prevent multiple failed authentication attempts, presents a HIGH risk (CVSS score 7.5). The core issue is that a crafted Javascript can expose the CAPTCHA, effectively allowing bots to bypass it. This significantly increases the susceptibility of the router to brute-force attacks. The business impact centers around potential denial of service or unauthorized access to the router's configuration. Likelihood of exploitation is moderate to high, as the attack vector is network-based and requires no user interaction. Ease of exploitation is relatively high given the exposed CAPTCHA. Confidentiality impact is minimal as the attack primarily affects availability. Integrity could be impacted if an attacker gains access and modifies configurations. The primary impact is on Availability, potentially causing service disruptions for users connected to the router. The EPSS score of 0.000630000 suggests a relatively low, but not insignificant, probability of exploitation in the wild.

    2. Potential Attack Scenarios
    An attacker could launch a brute-force attack against the router's web interface to gain administrative access. The attack vector is network-based; the attacker simply needs network connectivity to the router. The process involves sending a series of login attempts, leveraging a bot to bypass the CAPTCHA thanks to the exposed Javascript. Once the CAPTCHA is bypassed, the bot can rapidly cycle through common passwords or a pre-defined password list. Successful brute-forcing of the administrator account grants the attacker full control of the router's configuration, potentially allowing them to change DNS settings, redirect traffic, or even cause a denial of service. This could impact all devices connected to the router.

    3. Mitigation Recommendations
    The primary mitigation recommendation is to update the firmware of the NOKIA G-040W-Q router to version G040WQR231013 or later. This version includes fixes to properly handle authentication attempts and prevent easy CAPTCHA bypass. Organizations using this router should prioritize patching to minimize their exposure. In the interim, consider enabling additional security features on the router, such as limiting the number of failed login attempts allowed before a lockout period, and ensuring strong administrator passwords are used. Regularly review router logs for suspicious activity, looking for multiple failed login attempts from the same IP address. Refer to the official Chunghwa Telecom/Nokia advisory for detailed instructions: https://www.twcert.org.tw/tw/cp-132-7500-0c544-1.html.

    4. Executive Summary
    The Chunghwa Telecom NOKIA G-040W-Q router has a vulnerability that allows attackers to easily bypass the CAPTCHA during login attempts, making it more vulnerable to brute-force attacks. This could lead to an attacker gaining control of the router and disrupting internet service for connected devices. The risk is considered HIGH, and the recommended action is to update the router’s firmware to version G040WQR231013 as soon as possible. This vulnerability poses a potential disruption to network connectivity and requires prompt attention to maintain service availability. Delaying the update could result in a denial of service or unauthorized access to the router's configuration, impacting both home and potentially small business users.

    CVE-2023-41351

    Severity: CRITICAL

    Description: Chunghwa Telecom NOKIA G-040W-Q has a vulnerability of authentication bypass, which allows an unauthenticated remote attacker to bypass the authentication mechanism to log in to the device by an alternative URL. This makes it possible for unauthenticated remote attackers to log in as any existing users, such as an administrator, to perform arbitrary system operations or disrupt service.

    CVSS Score: 9.8

    Priority

    B

    CISA Data

    EPSS Data

    • EPSS: 0.000860000
    • Percentile: 0.247380000
    • Date: 2026-04-19

    ExploitDB

    No data available.

    HackerOne Data

    • Rank: 9116
    • Reports submitted count: 0
    • Unknown: 0
    • None: 0
    • Low: 0
    • Medium: 0
    • High: 0
    • Critical: 0

    GitHub PoCs

      Nuclei Templates

      No data available.

      VulnCheck Data

      Affected Products:

      • Chunghwa Telecom NOKIA G-040W-Q - Versions: G040WQR201207

      References:

      Risk Assessment

      1. Risk Assessment
      The Chunghwa Telecom NOKIA G-040W-Q device suffers from an authentication bypass vulnerability, allowing unauthenticated remote attackers to gain access as any existing user, potentially including administrators. The CVSS score of 9.8 (CRITICAL) indicates a high level of severity. The vulnerability’s nature – an alternate URL bypassing standard authentication – suggests relatively easy exploitation. The business impact could be significant. A successful attack could lead to full system compromise, allowing attackers to perform arbitrary operations, disrupt service, or exfiltrate sensitive data. The likelihood of exploitation is considered high, particularly if the device is exposed to the internet or a broadly accessible network. Impacts on confidentiality, integrity, and availability are all considered high, as attackers can read, modify, and disrupt the system. The EPSS score of 0.000860000 suggests a low but real-world probability of exploitation.

      2. Potential Attack Scenarios
      An attacker, leveraging the authentication bypass, could gain administrative access to the NOKIA G-040W-Q device. The attack vector is network-based, meaning the attacker doesn’t need physical access or user interaction. The attack process would involve identifying the alternate URL that bypasses the standard authentication process. This could be discovered through reconnaissance, such as brute-forcing common URLs or analyzing network traffic. Once the alternate URL is found, the attacker can simply access it to log in as any existing user, including the administrator. The potential outcome is full control of the device, allowing the attacker to change configurations, monitor traffic, disrupt service, or use the device as a launchpad for further attacks within the network.

      3. Mitigation Recommendations
      The primary mitigation is to update the NOKIA G-040W-Q firmware to version G040WQR231013 or later. This update addresses the authentication bypass vulnerability. Organizations should prioritize patching, especially for devices directly exposed to the internet. Implement network segmentation to limit the blast radius if a device is compromised. Monitor network traffic for unusual activity, particularly targeting the G-040W-Q device. Utilize strong passwords for all user accounts on the device. Regularly review user access rights to ensure the principle of least privilege is followed. Refer to the TWCert advisory for further details: https://www.twcert.org.tw/tw/cp-132-7501-6155a-1.html.

      4. Executive Summary
      The Chunghwa Telecom NOKIA G-040W-Q device has a critical vulnerability that allows attackers to bypass the login process and gain full control of the device. This means an attacker can potentially disrupt your service, steal sensitive data, or make changes to the device's configuration without needing a valid username and password. The vulnerability is considered easily exploitable and impacts confidentiality, integrity, and availability. We recommend immediately updating the device's firmware to version G040WQR231013 to address this issue. Prompt action is crucial to minimize the risk of a successful attack and protect your network and data. This vulnerability represents a significant risk and should be prioritized for remediation.

      CVE-2023-41352

      Severity: HIGH

      Description: Chunghwa Telecom NOKIA G-040W-Q has a vulnerability of insufficient filtering for user input. A remote attacker with administrator privilege can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services.

      CVSS Score: 7.2

      Priority

      B

      CISA Data

      EPSS Data

      • EPSS: 0.001790000
      • Percentile: 0.394610000
      • Date: 2026-04-19

      ExploitDB

      No data available.

      HackerOne Data

      • Rank: 9119
      • Reports submitted count: 0
      • Unknown: 0
      • None: 0
      • Low: 0
      • Medium: 0
      • High: 0
      • Critical: 0

      GitHub PoCs

        Nuclei Templates

        No data available.

        VulnCheck Data

        Affected Products:

        • Chunghwa Telecom NOKIA G-040W-Q - Versions: G040WQR201207

        References:

        Risk Assessment

        1. Risk Assessment
        The vulnerability in Chunghwa Telecom’s NOKIA G-040W-Q router, CVE-2023-41352, is an OS Command Injection flaw stemming from insufficient user input filtering. This allows a remote attacker with administrator privileges to execute arbitrary commands on the system. The base CVSS score of 7.2 (HIGH) indicates a significant risk. The likelihood of exploitation is moderate, as it requires administrator access, but the ease of exploitation is relatively low once administrator access is achieved, as command injection vulnerabilities are well-understood. The business impact is potentially high, as successful exploitation can compromise the confidentiality, integrity, and availability of the router and potentially the network it serves. Impacts range from service disruption and data breaches to complete system compromise, depending on the commands executed. The EPSS score of 0.001790000 suggests a relatively low, but not negligible, probability of exploitation in the wild.

        2. Potential Attack Scenarios
        A potential attack scenario involves an attacker gaining administrator access to the NOKIA G-040W-Q router, perhaps through a weak password or a separate vulnerability. Once authenticated, the attacker can leverage the command injection vulnerability by crafting a malicious input, such as a specially formatted hostname or DNS setting. This input, when processed by the router, will cause it to execute the attacker’s chosen command. For example, the attacker could inject a command to upload a reverse shell, granting persistent access to the router. Alternatively, the attacker could inject a command to modify the routing table, redirecting traffic and potentially eavesdropping on network communications. The ultimate outcome could be full control of the router, disruption of network services, or theft of sensitive data traversing the network.

        3. Mitigation Recommendations
        The primary mitigation for CVE-2023-41352 is to update the NOKIA G-040W-Q firmware to version G040WQR231013 or later. This update includes the necessary fixes to properly filter user input and prevent command injection. Administrators should prioritize this update, especially if the router is exposed to the internet or handles critical network traffic. Secondary mitigations include reviewing administrator account passwords and enforcing strong password policies. Consider implementing network segmentation to limit the blast radius of a potential compromise. Monitor the router logs for suspicious activity, such as unexpected command executions. The official advisory from TWcert provides further details and guidance: https://www.twcert.org.tw/tw/cp-132-7502-287ec-1.html. Regularly review firmware update schedules for the NOKIA G-040W-Q router to ensure timely application of security patches.

        4. Executive Summary
        The Chunghwa Telecom NOKIA G-040W-Q router is vulnerable to a Command Injection attack (CVE-2023-41352). This vulnerability allows a remote attacker with administrator privileges to execute arbitrary commands on the router, potentially disrupting services, stealing data, or gaining full control of the system. The risk is considered HIGH, and the impact on business operations could be significant. We recommend immediately updating the router's firmware to version G040WQR231013 or later to address this vulnerability. This update is critical to maintaining the security and availability of your network. Prioritizing this patch minimizes the risk of a successful attack and protects your organization from potential disruptions and data breaches. Failure to address this vulnerability could lead to significant operational and financial consequences.

        CVE-2023-41353

        Severity: HIGH

        Description: Chunghwa Telecom NOKIA G-040W-Q has a vulnerability of weak password requirements. A remote attacker with regular user privilege can easily infer the administrator password from system information after logging system, resulting in admin access and performing arbitrary system operations or disrupt service.

        CVSS Score: 8.8

        Priority

        B

        CISA Data

        EPSS Data

        • EPSS: 0.002690000
        • Percentile: 0.504650000
        • Date: 2026-04-19

        ExploitDB

        No data available.

        HackerOne Data

        • Rank: 9116
        • Reports submitted count: 0
        • Unknown: 0
        • None: 0
        • Low: 0
        • Medium: 0
        • High: 0
        • Critical: 0

        GitHub PoCs

          Nuclei Templates

          No data available.

          VulnCheck Data

          Affected Products:

          • Chunghwa Telecom NOKIA G-040W-Q - Versions: G040WQR201207

          References:

          Risk Assessment

          1. Risk Assessment
          The vulnerability CVE-2023-41353 affects the Chunghwa Telecom NOKIA G-040W-Q device, stemming from weak password requirements. This allows a remote attacker with regular user privilege to infer the administrator password, gaining full administrative access. The vulnerability has a CVSS score of 8.8 (HIGH), indicating a significant risk. The likelihood of exploitation is considered moderate to high, given the relative ease of password inference. The business impact is substantial, as successful exploitation allows attackers to perform arbitrary system operations, potentially disrupting service, compromising sensitive data, or altering system configurations. Confidentiality, integrity, and availability are all at high risk. While the EPSS score is relatively low at 0.002690000, this doesn't diminish the potential impact if exploited, especially considering the potential for widespread disruption if many devices are affected.

          2. Potential Attack Scenarios
          A potential attack scenario involves an attacker gaining regular user access to the NOKIA G-040W-Q device, perhaps through a default credential or a compromised user account. Once logged in, the attacker can analyze system information (likely through the device’s web interface or command line) to infer the administrator password. The weak password requirements mean the admin password is predictable based on common patterns or system details. With the administrator password in hand, the attacker can then log in as the administrator and perform various actions, such as changing system settings, viewing stored data, or even disrupting the service provided by the device, potentially impacting the Chunghwa Telecom network and its customers. This could lead to denial of service, data breaches, or configuration changes that impact performance.

          3. Mitigation Recommendations
          The primary mitigation recommendation is to update the NOKIA G-040W-Q firmware to version G040WQR231013 or later. This update should address the weak password requirements. Organizations utilizing this device should prioritize patching, especially if it's customer-facing or handles sensitive data. Implement strong password policies for all user accounts, including regular users, to limit the effectiveness of password inference attacks. Consider multi-factor authentication if supported by the device to add an extra layer of security. Regularly review system logs for suspicious activity and monitor for unauthorized access attempts. Further information regarding the vulnerability and updates can be found at: https://www.twcert.org.tw/tw/cp-132-7503-a27ed-1.html.

          4. Executive Summary
          CVE-2023-41353 is a high-severity vulnerability affecting the Chunghwa Telecom NOKIA G-040W-Q device. It allows an attacker with regular user access to easily infer the administrator password, gaining full control of the device. This could lead to service disruption, data breaches, or configuration changes impacting network performance. The vulnerability stems from weak password requirements and is relatively easy to exploit. The recommended mitigation is to update the firmware to version G040WQR231013 or later. Addressing this vulnerability is critical to maintaining the security and reliability of the NOKIA G-040W-Q device and protecting the Chunghwa Telecom network and its customers from potential disruption and data compromise. Prompt action is recommended to minimize the risk.

          CVE-2023-41355

          Severity: CRITICAL

          Description: Chunghwa Telecom NOKIA G-040W-Q Firewall function has a vulnerability of input validation for ICMP redirect messages. An unauthenticated remote attacker can exploit this vulnerability by sending a crafted package to modify the network routing table, resulting in a denial of service or sensitive information leaking.

          CVSS Score: 9.8

          Priority

          B

          CISA Data

          EPSS Data

          • EPSS: 0.002960000
          • Percentile: 0.529810000
          • Date: 2026-04-19

          ExploitDB

          No data available.

          HackerOne Data

          • Rank: 9119
          • Reports submitted count: 0
          • Unknown: 0
          • None: 0
          • Low: 0
          • Medium: 0
          • High: 0
          • Critical: 0

          GitHub PoCs

            Nuclei Templates

            No data available.

            VulnCheck Data

            Affected Products:

            • Chunghwa Telecom NOKIA G-040W-Q - Versions: G040WQR201207

            References:

            Risk Assessment

            1. Risk Assessment
            The vulnerability in the Chunghwa Telecom NOKIA G-040W-Q Firewall, specifically an improper input validation of ICMP redirect messages, presents a critical risk. The nature of the vulnerability allows an unauthenticated remote attacker to manipulate the network routing table. This means an attacker doesn’t need credentials to exploit the flaw, increasing the likelihood of successful exploitation. The CVSS score of 9.8 (Critical) indicates a high degree of severity. The business impact is significant, potentially leading to denial of service, disrupting network connectivity for users and applications. Sensitive information could be leaked as traffic is misrouted. The ease of exploitation is relatively high due to the low attack complexity and the fact that no user interaction is required. All three pillars of security – Confidentiality, Integrity, and Availability – are impacted, making this a substantial threat. The EPSS score of 0.002960000 suggests the vulnerability, while critical, might not be widely exploited yet, but the potential impact warrants prompt attention.

            2. Potential Attack Scenarios
            An attacker could leverage this vulnerability to perform a man-in-the-middle (MITM) attack. The attack vector would be sending a crafted ICMP redirect message to the vulnerable firewall. The attacker initiates by observing network traffic to identify a target communication flow. They then craft an ICMP redirect message that subtly alters the routing table, causing traffic destined for the target to be routed through the attacker’s machine. This allows the attacker to intercept, inspect, and potentially modify the traffic before forwarding it to its original destination. The potential outcome is the attacker can steal sensitive data, like usernames, passwords or financial information, or subtly alter the data being transmitted, causing disruptions or incorrect processing. Another scenario involves a simple denial of service – the attacker could craft a redirect message that causes the firewall to continuously loop traffic, exhausting resources and eventually causing the firewall to become unresponsive, impacting network connectivity for all users behind it.

            3. Mitigation Recommendations
            The primary mitigation recommendation is to update the NOKIA G-040W-Q firmware to version G040WQR231013 or later. This update includes the fix for the ICMP redirect input validation vulnerability. As an immediate action, network administrators should monitor ICMP traffic for unusual redirect messages. Implementing rate limiting on ICMP redirect messages can help to mitigate the impact of an attack, even before patching. Consider deploying intrusion detection/prevention systems (IDS/IPS) that can identify and block malicious ICMP redirect messages. Segmentation of the network can also limit the scope of the attack, preventing the attacker from accessing all network resources if the firewall is compromised. Refer to the following resources for more information: https://www.twcert.org.tw/tw/cp-132-7505-a0c94-1.html and https://packetstormsecurity.com/search/?q=CVE-2023-41355.

            4. Executive Summary
            CVE-2023-41355 is a critical vulnerability affecting the Chunghwa Telecom NOKIA G-040W-Q Firewall. An unauthenticated attacker can exploit this flaw by sending a crafted ICMP message, potentially disrupting network connectivity or stealing sensitive information. This vulnerability impacts the confidentiality, integrity, and availability of our network. The recommended mitigation is to update the firewall firmware to version G040WQR231013. This update should be prioritized to minimize the risk of a successful attack. Addressing this vulnerability is crucial to maintaining stable network operations and protecting our valuable data. Delaying patching could result in significant business disruption and potential data breaches. Prompt action is recommended to ensure a secure network environment.