Hub 3.0 permitting inbound traffic from Internet when it shouldn't
I've noticed what looks like a bug with the VM Hub 3.0 firewall / NAT state table.
Had anyone else seen this before?
Model: Compal CH7465LG (The white tower, cable, DOCSIS 3.0)
Firmware: LG-RDK_CH7465LG-NCIP-6.18-2406.17-NOSH
Some network scan traffic from the Internet is making it through the router and hitting my internal devices. I have no port forwarding configured or anything like that. In theory this traffic should not be permitted by the router due to standard stateful network device behaviour (NAT state table, stateful firewalling)
The destination ports are all in the high range (49152-65535, typically used as ephemeral source ports)
Because of the high range destination ports, I had a suspicion that maybe the router was letting through traffic that was destined to existing source ports in table.
I did some packet captures on my laptop and lo-and-behold, I found examples of this inbound traffic from malicious public IPs, where the destination port was matching the source port of some existing outbound connection I had from my laptop.
Ex.
Existing outbound: source IP 192.168.0.123, source port 53000, destination IP 165.223.54.56, destination port 443
Malicious inbound: source IP 5.5.5.5, source port 61000, destination IP 192.168.0.123, destination port 53000
No connection is actually completed as there isn't actually a service listening on my laptop on that ephemeral source port. So in the packet capture it's just a TCP SYN and then retransmissions as the malicious public IP retries a few more times.
But there's 100% traffic sourced from the Internet getting through my router that there shouldn't be.
I checked with a couple of friends who have the same device, but they have it in bridge mode and use their own router, they don't have this issue. I also checked with a family member who has the same device as me in router mode and the same thing is happening for them.
Seems like a security concern.