CVE-2024-11652

4.7 MEDIUM

📋 TL;DR

This critical vulnerability in EnGenius networking devices allows remote attackers to execute arbitrary commands by manipulating the 'https_enable' parameter in the /admin/sn_package/sn_https endpoint. Attackers can gain full control of affected devices without authentication. Organizations using EnGenius ENH1350EXT, ENS500-AC, or ENS620EXT devices are at risk.

💻 Affected Systems

Products:
  • EnGenius ENH1350EXT
  • EnGenius ENS500-AC
  • EnGenius ENS620EXT
Versions: All versions up to November 18, 2024
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with web administration interface accessible are vulnerable. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to install persistent backdoors, pivot to internal networks, intercept traffic, or use devices as botnet nodes.

🟠

Likely Case

Remote code execution leading to device takeover, credential theft, network reconnaissance, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation prevents lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available and trivial to weaponize. No authentication required for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Contact EnGenius support for firmware updates. Consider replacing devices if no patch is forthcoming.

🔧 Temporary Workarounds

Disable Web Administration Interface

all

Prevent access to the vulnerable endpoint by disabling the web administration interface entirely

Network Access Control

linux

Restrict access to device administration interfaces using firewall rules

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Isolate affected devices in separate VLAN with strict firewall rules preventing all inbound connections
  • Implement network monitoring and IDS/IPS rules to detect exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if device responds to HTTP requests on /admin/sn_package/sn_https with https_enable parameter. Use curl: curl -X POST 'http://device-ip/admin/sn_package/sn_https' --data 'https_enable=test'

Check Version:

Check web interface login page or use SNMP: snmpwalk -v2c -c public device-ip 1.3.6.1.2.1.1.1

Verify Fix Applied:

Test if command injection is possible by attempting exploitation with safe payloads. Verify firmware version is newer than November 18, 2024.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /admin/sn_package/sn_https
  • Commands containing shell metacharacters in https_enable parameter
  • Unexpected process execution or configuration changes

Network Indicators:

  • HTTP POST requests to vulnerable endpoint with suspicious payloads
  • Outbound connections from devices to unknown IPs
  • Unusual traffic patterns from device management interfaces

SIEM Query:

source="device-logs" AND (url="/admin/sn_package/sn_https" AND method="POST" AND (param="https_enable" AND value MATCHES "[;&|`$()]"))

🔗 References

📤 Share & Export