Old Code Dies Hard: Finding New Vulnerabilities in Old Third-Party Software Components
This talk demonstrates how to identify and exploit vulnerabilities in legacy third-party software components embedded within IoT/OT devices, specifically focusing on the Sierra Wireless AirLink gateway. The researchers perform firmware analysis, emulation, and fuzzing to uncover multiple vulnerabilities, including RCE, XSS, and DoS, in components like TinyXML and OpenNDS. The presentation highlights the critical risks of relying on outdated, unpatched open-source code in critical infrastructure and emphasizes the importance of maintaining an accurate Software Bill of Materials (SBOM).
Rooting Sierra Wireless AirLink Gateways via Legacy Component Exploitation
TLDR: Researchers at Black Hat 2023 demonstrated how to compromise Sierra Wireless AirLink gateways by targeting unpatched, legacy open-source components like TinyXML and OpenNDS. By performing firmware analysis and emulation, they uncovered a chain of vulnerabilities including heap-based buffer overflows and command injection that lead to full root access. This research serves as a stark reminder that critical infrastructure often relies on forgotten, vulnerable code that remains unpatched long after the upstream project has been abandoned.
Security researchers often focus their efforts on the latest web frameworks or cloud-native vulnerabilities, but the most dangerous gaps frequently hide in the forgotten corners of embedded systems. The recent research presented at Black Hat 2023 on Sierra Wireless AirLink gateways highlights a recurring nightmare for security professionals: critical infrastructure running on top of abandoned, unpatched third-party software. These gateways are ubiquitous in industrial environments, managing everything from electrical substations to police vehicle communications, yet they are often treated as black boxes that require little oversight.
The Anatomy of the Gateway Compromise
The researchers focused on the AirLink Enterprise Operating System (ALEOS), which powers these gateways. Their methodology was straightforward but effective: obtain the firmware, decrypt it, and perform a mix of static and dynamic analysis. Because the devices lacked built-in debugging capabilities, the team used Docker and the QEMU ARM system emulator to spin up the gateway’s management interface, known as ACEmanager, in a controlled environment.
This approach revealed that the firmware was riddled with legacy components that had not seen a security update in years. One such component was TinyXML, a library for parsing XML that has been effectively dead for over a decade. Despite being replaced by newer alternatives, it remained deeply embedded in the authentication procedures of the gateway.
Exploiting the Weakest Links
The team identified a heap-based buffer overflow in TinyXML, tracked as CVE-2023-40462. By sending a specifically crafted, malformed XML payload via a POST request, an attacker can trigger an infinite loop or a crash, leading to a denial-of-service condition. While a crash might seem trivial, it is often the first step in a more complex exploitation chain.
Even more concerning was the discovery of an unrestricted file upload vulnerability, CVE-2023-40460. The management interface allowed users to upload configuration templates in XML format. The validation logic was laughably weak, checking only for the presence of an XML tag rather than the file content itself. An attacker could upload an arbitrary file, including malicious scripts, which would then be served by the web server. When combined with the fact that the device runs with root privileges, this allows for trivial remote code execution.
The researchers demonstrated this by uploading a file that, when accessed, executed arbitrary commands on the underlying Linux system. The following payload structure illustrates how simple it is to bypass the validation:
POST /cgi/connect.cgi HTTP/1.1
Host: localhost:1000
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary
------WebKitFormBoundary
Content-Disposition: form-data; name="upload-file"; filename="malicious.html"
Content-Type: text/html
<xml>
... malicious payload here ...
</xml>
Real-World Applicability for Pentesters
For those conducting penetration tests on industrial or IoT environments, these findings are a goldmine. If you encounter an AirLink gateway during an engagement, do not assume it is secure just because it is a "hardened" appliance. Use Shodan to identify exposed management interfaces, but be aware that many of these devices are not directly reachable from the public internet. During an internal assessment, you should prioritize scanning for the ACEmanager web UI.
The impact of these vulnerabilities is severe. Because these devices often sit at the intersection of IT and OT networks, a compromise here provides a perfect pivot point for lateral movement. Once you have root access, you can modify firewall rules, intercept traffic, or deploy persistent malware. The researchers noted that many of these devices are end-of-life, meaning they will never receive patches for these vulnerabilities. If you find one, you are likely looking at a permanent, unfixable hole in the client's network.
The Defensive Reality
Defending against these threats requires moving beyond the "many eyes" fallacy. Just because a component is open-source does not mean it is being actively audited or patched. Organizations must maintain an accurate Software Bill of Materials (SBOM) to track exactly what code is running on their devices. If a vendor cannot provide an SBOM, they are essentially asking you to trust that their legacy code is secure, which is a dangerous gamble.
Furthermore, the "security by obscurity" approach—relying on encrypted firmware or hidden management ports—is failing. Defenders should implement strict network segmentation, ensuring that management interfaces are never exposed to untrusted segments. If a device is end-of-life, the only viable security strategy is to isolate it completely or replace it with hardware that receives active security support.
The research presented at Black Hat is a stark reminder that the "old code" in our infrastructure is not going anywhere. It is sitting on the network, waiting for someone to look closely enough to find the cracks. As a researcher or pentester, your job is to find those cracks before the threat actors do. Start by auditing the third-party dependencies in the devices you test, and you will likely find that the most critical vulnerabilities are the ones that have been hiding in plain sight for years.
CVEs
Vulnerability Classes
Target Technologies
Attack Techniques
OWASP Categories
All Tags
Up Next From This Conference

A Security RISC? The State of Microarchitectural Attacks on RISC-V

REDIScovering HeadCrab: A Technical Analysis of a Novel Malware and the Mind Behind It

TsuKing: Coordinating DNS Resolvers and Queries into Potent DDoS Amplifiers
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Kill List: Hacking an Assassination Site on the Dark Web

