CVE-2024-10428

7.2 HIGH

📋 TL;DR

This critical vulnerability allows remote attackers to execute arbitrary commands on affected WAVLINK routers by manipulating the dhcpGateway parameter in the set_ipv6 function of firewall.cgi. Attackers can gain full control of the device without authentication. All users of affected WAVLINK router models with firmware up to October 28, 2022 are vulnerable.

💻 Affected Systems

Products:
  • WAVLINK WN530H4
  • WAVLINK WN530HG4
  • WAVLINK WN572HG3
Versions: All versions up to 20221028 (October 28, 2022)
Operating Systems: Embedded Linux firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable as the firewall.cgi interface is typically accessible via web administration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover allowing attackers to install persistent backdoors, pivot to internal networks, intercept all network traffic, or use the device as part of a botnet.

🟠

Likely Case

Remote code execution leading to device compromise, credential theft, network surveillance, and potential lateral movement to other internal systems.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation prevents lateral movement.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication, making internet-facing devices immediate targets.
🏢 Internal Only: MEDIUM - Internal devices are still vulnerable to attackers who gain network access, but require initial foothold.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit documentation exists and the vulnerability requires minimal technical skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor has not responded to disclosure. Consider replacing affected devices or implementing strict network controls.

🔧 Temporary Workarounds

Disable IPv6 Administration Interface

all

Disable IPv6 configuration through the web interface if not required

Network Access Control

linux

Restrict access to router administration interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Immediately isolate affected routers in a dedicated VLAN with strict egress filtering
  • Implement network monitoring for unusual outbound connections from router IPs

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface at System Status > Firmware Version. If version date is 20221028 or earlier, device is vulnerable.

Check Version:

curl -s http://router-ip/cgi-bin/status.cgi | grep Firmware

Verify Fix Applied:

No fix available to verify. Monitor for firmware updates from vendor.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /cgi-bin/firewall.cgi with dhcpGateway parameter containing shell metacharacters
  • Unexpected process execution from web server context

Network Indicators:

  • Outbound connections from router to unknown external IPs
  • Unusual traffic patterns from router management interface

SIEM Query:

source="router_logs" AND uri="/cgi-bin/firewall.cgi" AND (param="dhcpGateway" AND value MATCHES "[;|&`$()]+")

🔗 References

📤 Share & Export