• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

ET EXPLOIT Realtek SDK - Command Execution/Backdoor Access Inbound (CVE-2021-35394)

Scheduled Pinned Locked Moved IDS/IPS
9 Posts 4 Posters 1.4k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J
    JonathanLee
    last edited by JonathanLee May 22, 2023, 4:40 AM May 22, 2023, 4:38 AM

    Hello Fellow Netgate Community members,

    I wanted to ask if anyone else has started to notice this "Command Execution/Backdoor Access" CVE being exploited?

    Screenshot 2023-05-21 at 9.32.27 PM.png
    (SNORT stopping CVE-2021-35394)

    I have seen this several times from this IP address

    Screenshot 2023-05-21 at 9.34.59 PM.png
    (Virustotal flagged this IP)

    https://nvd.nist.gov/vuln/detail/cve-2021-35394

    How is this CVE being used with the 2100-MAX to my understanding it has no Realtek NIC, does the Raspberry PI have this NIC?

    Make sure to upvote

    G S 2 Replies Last reply May 22, 2023, 6:44 AM Reply Quote 0
    • G
      Gertjan @JonathanLee
      last edited by May 22, 2023, 6:44 AM

      @jonathanlee

      As usual :
      pfSense is not a develop system, it does not have a - or this - SDK.
      To use the SDK, it has to be installed, and a user should have access to pfSense to 'execute it'.
      And for good manners : using a Realtek NIC has its own potential load of issues, not really 'CVE', it's more a 'not done' thing.

      I don't think Netgate ever used Realtek NICs.

      No "help me" PM's please. Use the forum, the community will thank you.
      Edit : and where are the logs ??

      J 1 Reply Last reply May 22, 2023, 9:40 PM Reply Quote 0
      • S
        SteveITS Galactic Empire @JonathanLee
        last edited by May 22, 2023, 12:30 PM

        @jonathanlee Hackets/bots will fling random exploits at IPs to see what they can find. I view it as, if they try X they may try other things but theyโ€™re blocked now.

        You can always just block the IP by firewall rule but it will be another IP/exploit tried tomorrow.

        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
        Upvote ๐Ÿ‘ helpful posts!

        J 1 Reply Last reply May 22, 2023, 9:39 PM Reply Quote 1
        • J
          JonathanLee @SteveITS
          last edited by JonathanLee May 22, 2023, 9:43 PM May 22, 2023, 9:39 PM

          @steveits in cyber security class we learned how to actually use decoy IP address when we got blocked. It was an amazing class. The bug I found durring this was that I could use a decoy address that matched the target and get the IPS to block itself. That Lab I got a really good grade on. It's the double edge sword of enumeration, as if they have the IPS block scans it would block itself they would set it to ignore on that address because it would bring the system down, so you have to make special rules for when that was abused. If it was set to ignore you could scan the Network and see what ports are open. What would be a good security rule to stop that? I set my inbound to block my IP address, my IP only goes outbound.

          Make sure to upvote

          1 Reply Last reply Reply Quote 0
          • J
            JonathanLee @Gertjan
            last edited by May 22, 2023, 9:40 PM

            @gertjan I wonder why this is being exploited on my network, I don't think I have a realtek NIC card on anything.

            Make sure to upvote

            S 1 Reply Last reply May 22, 2023, 9:53 PM Reply Quote 0
            • S
              SteveITS Galactic Empire @JonathanLee
              last edited by May 22, 2023, 9:53 PM

              @jonathanlee said in ET EXPLOIT Realtek SDK - Command Execution/Backdoor Access Inbound (CVE-2021-35394):

              I wonder why this is being exploited on my network

              I think you're misunderstanding. The alert does not mean there was a successful attempt, or that you are vulnerable, it generally means the hacker connected to 38 million IP addresses today to try this hack, and one of them was yours. Or else tried 1000 hacks on your IP to see if any worked before moving on.

              Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
              When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
              Upvote ๐Ÿ‘ helpful posts!

              J 1 Reply Last reply May 23, 2023, 12:47 AM Reply Quote 2
              • J
                JonathanLee @SteveITS
                last edited by May 23, 2023, 12:47 AM

                @steveits The firewall stomped it out ๐Ÿ˜Ž

                Make sure to upvote

                1 Reply Last reply Reply Quote 0
                • A
                  ASGR71
                  last edited by May 27, 2023, 11:52 AM

                  Hey JL,

                  I have this pop up every now and again, the ip addresses seem random but always use the same port number, something 9030 or 9040...

                  As mentioned, pfsense / snort blocked it. I feel sorry for the people that use the default router from their ISP and don't have a router / firewall like pfsense! ๐Ÿคฃ

                  S 1 Reply Last reply May 27, 2023, 12:23 PM Reply Quote 0
                  • S
                    SteveITS Galactic Empire @ASGR71
                    last edited by May 27, 2023, 12:23 PM

                    @ASGR71 Yes but to be fair 98% of them donโ€™t have any inbound ports forwarding. Some for games or uPnP I suppose.

                    Sine I donโ€™t see I mentioned it above, if one runs Snort or Suricata on WAN, that runs outside the firewall so will block all sorts of things that would get blocked anyway. Running it on LAN avoids a lot of scanning plus will show internal IPs in the alerts.

                    Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                    When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                    Upvote ๐Ÿ‘ helpful posts!

                    1 Reply Last reply Reply Quote 0
                    9 out of 9
                    • First post
                      9/9
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                      This community forum collects and processes your personal information.
                      consent.not_received