CVE-2024-23910

8.8 HIGH

📋 TL;DR

A cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers and repeaters allows remote unauthenticated attackers to trick administrators into performing unintended actions. This affects administrators of the listed ELECOM devices, potentially compromising router configuration and network security.

💻 Affected Systems

Products:
  • ELECOM wireless LAN routers
  • ELECOM wireless LAN repeaters
  • WMC-X1800GST-B
  • WSC-X1800GS-B
  • e-Mesh Starter Kit WMC-2LX-B
Versions: Specific versions not detailed in CVE; all versions prior to patched firmware are likely affected.
Operating Systems: Embedded router OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with web administration interfaces accessible over network; exact model list may extend beyond those mentioned.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full administrative control of the router, enabling network traffic interception, DNS hijacking, firmware modification, or disabling security features.

🟠

Likely Case

Attacker modifies router settings (e.g., DNS, firewall rules, admin credentials) to redirect traffic, steal data, or create backdoors.

🟢

If Mitigated

Limited impact if CSRF protections are implemented or administrative sessions are properly managed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CSRF attacks typically require social engineering (e.g., phishing) to lure administrator to malicious site; no authentication needed to trigger exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific firmware versions.

Vendor Advisory: https://www.elecom.co.jp/news/security/20240220-01/

Restart Required: Yes

Instructions:

1. Visit ELECOM support website. 2. Download latest firmware for your device model. 3. Log into router admin interface. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Reboot device.

🔧 Temporary Workarounds

Enable CSRF Protection

all

Implement anti-CSRF tokens in web forms if supported by device firmware.

Restrict Admin Access

all

Limit administrative interface access to trusted IP addresses or VLANs only.

🧯 If You Can't Patch

  • Disable remote administration and only access admin interface from trusted internal network.
  • Use browser extensions that block CSRF attempts and enforce same-origin policies.

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against patched versions in vendor advisory; if unpatched and web admin is accessible, assume vulnerable.

Check Version:

Log into router web interface and navigate to system info or firmware status page.

Verify Fix Applied:

Confirm firmware version matches or exceeds patched version listed in vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected configuration changes in router logs
  • Admin login from unusual IP addresses

Network Indicators:

  • Suspicious HTTP POST requests to admin endpoints from external sources

SIEM Query:

Search for web requests to router admin paths (e.g., /cgi-bin/*) from non-trusted IPs.

🔗 References

📤 Share & Export