CVE-2024-11659

4.7 MEDIUM

📋 TL;DR

This CVE describes a critical command injection vulnerability in EnGenius networking devices that allows remote attackers to execute arbitrary commands on affected systems. The vulnerability exists in the /admin/network/diag_iperf file where the 'iperf' argument can be manipulated to inject malicious commands. Organizations using EnGenius ENH1350EXT, ENS500-AC, and ENS620EXT devices up to November 18, 2024 are affected.

💻 Affected Systems

Products:
  • EnGenius ENH1350EXT
  • EnGenius ENS500-AC
  • EnGenius ENS620EXT
Versions: All versions up to 20241118
Operating Systems: Embedded Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web administration interface accessible via network. Requires access to the /admin/network/diag_iperf endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to gain root access, install persistent backdoors, pivot to internal networks, and exfiltrate sensitive data.

🟠

Likely Case

Attackers gain shell access to execute commands, potentially installing cryptocurrency miners, creating backdoors, or disrupting network services.

🟢

If Mitigated

Limited impact due to network segmentation, proper access controls, and monitoring that detects and blocks exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details have been publicly disclosed. Attack requires access to the admin interface but may be combined with other vulnerabilities or default credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: Yes

Instructions:

1. Check EnGenius website for firmware updates
2. Download latest firmware for your device model
3. Backup current configuration
4. Upload and install new firmware via web interface
5. Restart device
6. Restore configuration if needed

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict access to the admin interface to trusted IP addresses only

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Disable Vulnerable Endpoint

linux

Block access to the vulnerable /admin/network/diag_iperf endpoint

iptables -A INPUT -p tcp --dport 80 -m string --string "/admin/network/diag_iperf" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string "/admin/network/diag_iperf" --algo bm -j DROP

🧯 If You Can't Patch

  • Isolate affected devices in separate VLAN with strict firewall rules
  • Implement network monitoring and IDS/IPS to detect exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface at System > Firmware or via SSH with 'cat /etc/version'

Check Version:

ssh admin@device_ip 'cat /etc/version' or check web interface System > Firmware

Verify Fix Applied:

Verify firmware version is newer than 20241118 and test the /admin/network/diag_iperf endpoint with safe payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual commands in system logs
  • Multiple failed authentication attempts followed by successful access to /admin/network/diag_iperf
  • Suspicious process execution

Network Indicators:

  • HTTP POST requests to /admin/network/diag_iperf with shell metacharacters
  • Outbound connections from device to unusual destinations

SIEM Query:

source="device_logs" AND (url="/admin/network/diag_iperf" OR cmd="*;*" OR cmd="*|*" OR cmd="*`*" OR cmd="*$(*")

🔗 References

📤 Share & Export