The cybersecurity community is constantly discovering new vulnerabilities and exploits. One such recently discovered vulnerability is CVE-2022-43367, which affects IP-COM EW9 V15.11..14(9732). This vulnerability is a command injection, allowing malicious actors to execute arbitrary commands on the system. In this long read post, we will discuss the details of this vulnerability, its impact, and the code snippet that demonstrates the exploit.


IP-COM is a provider of professional networking equipment, and their solutions cater to various scenarios such as SMB, education, hospitality, and more. The IP-COM EW9 is a high-performance router that is part of their product lineup. It is designed for enterprise networks and is required to provide secure and efficient network connections. Unfortunately, even such devices may contain vulnerabilities that can be exploited by attackers to compromise network security.

The Vulnerability (CVE-2022-43367)

CVE-2022-43367 refers to a command injection vulnerability that was discovered in the IP-COM EW9 V15.11..14(9732) firmware version. Specifically, this vulnerability is present in the formSetDebugCfg function of the device's web management interface. This function is responsible for handling user input and processing debug configurations. However, the function fails to properly sanitize the user input data, which allows attackers to inject arbitrary commands that will be executed with root privileges. This effectively gives the attacker total control of the system and the ability to manipulate it for their own purposes.

Exploit Details

To exploit this vulnerability, an attacker must first gain access to the web management interface. This can be achieved through various means, such as social engineering, phishing, or brute-forcing weak credentials. Once the attacker has access, they can use a specially crafted HTTP POST request to trigger the command injection vulnerability. In the example below, we demonstrate a simple payload that exploits this vulnerability:

import requests

url = "http://<target_ip>/goform/formSetDebugCfg";
data = {"main_thread": "", "new_time": "$(COMMAND TO EXECUTE)"}

response =, data=data, cookies={"Cookie": "UserName=admin"}) 

if response.status_code == 200:
    print("Exploit successful!")
    print("Exploit failed.")

The attacker only needs to replace <target_ip> with the actual IP address of the target device and COMMAND TO EXECUTE with the desired arbitrary command to be executed on the system. The code above uses the Python programming language, and the requests library to send HTTP POST requests.

Original References

1. CVE-2022-43367 Vulnerability Details on NVD
2. IP-COM's Official Website
3. IP-COM EW9 Product Webpage

Mitigation Recommendations

In order to protect against this vulnerability, it is crucial to update the firmware of your IP-COM EW9 router to the latest version. IP-COM should release a patch addressing this vulnerability as soon as possible to ensure their customers' continued protection. Additionally, it is recommended to use strong and unique passwords, regularly change them and limit access to the web management interface for enhanced security.


CVE-2022-43367 is a critical command injection vulnerability in IP-COM EW9 V15.11..14(9732), which allows attackers to execute arbitrary commands on affected devices. It is important for users and administrators to be aware of this vulnerability and apply the necessary patches and updates to mitigate the risk. It also serves as a reminder that even devices designed to enhance security can have vulnerabilities, necessitating ongoing vigilance and cybersecurity best practices to maintain a secure network.


Published on: 10/27/2022 18:15:00 UTC
Last modified on: 10/31/2022 18:35:00 UTC