CVE-2024-13129

8.8 HIGH

📋 TL;DR

CVE-2024-13129 is a critical OS command injection vulnerability in Roxy-WI's action_service function that allows remote attackers to execute arbitrary commands on affected systems. This affects Roxy-WI versions up to 8.1.3, potentially compromising web interface servers and underlying infrastructure. Attackers can exploit this to gain unauthorized access and control over vulnerable installations.

💻 Affected Systems

Products:
  • Roxy-WI
Versions: up to 8.1.3
Operating Systems: Any OS running Roxy-WI
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using vulnerable versions are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands with web server privileges, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Attackers gain shell access to the Roxy-WI server, allowing them to modify configurations, steal credentials, or use the server as a pivot point for further attacks.

🟢

If Mitigated

With proper network segmentation and least privilege, impact is limited to the Roxy-WI application server, though sensitive data on that server remains at risk.

🌐 Internet-Facing: HIGH - Remote exploitation without authentication makes internet-facing instances immediate targets for automated attacks.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable to insider threats or attackers who have gained initial network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and requires no authentication, making this easily weaponizable by attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.1.4

Vendor Advisory: https://github.com/roxy-wi/roxy-wi/releases/tag/v8.1.4

Restart Required: No

Instructions:

1. Backup current configuration. 2. Stop Roxy-WI service. 3. Update to version 8.1.4 via package manager or manual installation. 4. Restart Roxy-WI service. 5. Verify functionality.

🔧 Temporary Workarounds

Network Access Restriction

Linux

Restrict network access to Roxy-WI web interface to trusted IP addresses only

iptables -A INPUT -p tcp --dport [ROXY-WI-PORT] -s [TRUSTED-IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [ROXY-WI-PORT] -j DROP

🧯 If You Can't Patch

  • Immediately restrict network access to Roxy-WI interface using firewall rules
  • Monitor logs for suspicious command execution patterns and implement WAF rules to block injection attempts

🔍 How to Verify

Check if Vulnerable:

Check Roxy-WI version: grep 'version' /path/to/roxy-wi/config or check web interface footer

Check Version:

grep -r 'version' /opt/roxy-wi/ 2>/dev/null || echo 'Check web interface'

Verify Fix Applied:

Verify version is 8.1.4 or higher and test that action_service parameter inputs are properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in Roxy-WI logs
  • Multiple failed login attempts followed by successful access
  • Suspicious system commands in web server logs

Network Indicators:

  • Unusual outbound connections from Roxy-WI server
  • Traffic to known malicious IPs
  • Unexpected port scans originating from Roxy-WI server

SIEM Query:

source="roxy-wi.log" AND ("os.system" OR "subprocess" OR "exec" OR suspicious command patterns)

🔗 References

📤 Share & Export