• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Realtek SDK Exploit Attempt - CVE-2021-35394

Risk Factors

Routers, WiFi extenders, and Internet of Things (IoT) devices with Realtek software development kit (SDK) firmware are sometimes exposed to the internet. This vulnerability can be exploited with basic command-line tools. An unauthenticated attacker can gain control of an IoT device, such as a router, to launch further attacks on a network.

Kill Chain

Exploitation

Risk Score

83

Detection diagram
Next in Exploitation: Realtek SDK Exploit Attempt - CVE-2021-35395

Attack Background

Realtek is a semiconductor company that produces software development kit (SDK) firmware to enable wireless connections for various devices ranging from routers to IP cameras. Realtek SDK includes a command injection vulnerability in the diagnostic tool, MP Daemon. MP Daemon acts as a UDP server and listens for incoming traffic to the IoT device. An attacker creates a specially designed UDP datagram, where the first three characters (orf) precede a command (such as pwd). The MP Daemon tool does not validate the request and runs the command on the device.

Mitigation Options

Quarantine the device while checking for indicators of compromise

Run regular software updates on IoT devices with Realtek SDK firmware

MITRE ATT&CK ID

What else can RevealX do for you?