CVE-2024-2415

7.8 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in Movistar 4G routers that allows authenticated users to execute arbitrary commands on the device by sending specially crafted POST requests to the '/cgi-bin/gui.cgi' endpoint. The vulnerability affects users of Movistar 4G routers with version ES_WLD71-T1_v2.0.201820. Attackers with valid credentials can potentially gain full control of the router.

💻 Affected Systems

Products:
  • Movistar 4G Router
Versions: ES_WLD71-T1_v2.0.201820
Operating Systems: Embedded router OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web interface. Default credentials or weak passwords increase risk significantly.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with valid credentials could gain complete control of the router, intercept all network traffic, install persistent backdoors, pivot to internal networks, and potentially compromise connected devices.

🟠

Likely Case

An authenticated attacker (either malicious insider or someone who obtained credentials) executes commands to reconfigure the router, steal credentials, or use it as a foothold for further attacks.

🟢

If Mitigated

With proper network segmentation and strong authentication controls, impact is limited to the router itself without lateral movement to other systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication but is technically simple once credentials are obtained. The vulnerability is in a CGI script that improperly handles user input.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-movistar-4g-router

Restart Required: Yes

Instructions:

1. Check with Movistar/ISP for firmware updates. 2. If update available, download from official source. 3. Access router admin interface. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Restrict Web Interface Access

all

Limit access to the router's web administration interface to trusted IP addresses only.

Change Default Credentials

all

Ensure strong, unique passwords are set for router administration.

🧯 If You Can't Patch

  • Isolate the router on a dedicated network segment with strict firewall rules
  • Implement network monitoring for suspicious POST requests to '/cgi-bin/gui.cgi'

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is ES_WLD71-T1_v2.0.201820, the device is vulnerable.

Check Version:

Login to router web interface and check System Information or Firmware Version page.

Verify Fix Applied:

Verify firmware version has changed from ES_WLD71-T1_v2.0.201820 to a newer version.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to '/cgi-bin/gui.cgi' with unusual parameters
  • Failed authentication attempts followed by successful login and POST requests

Network Indicators:

  • Unusual outbound connections from router IP
  • POST requests to router IP on port 80/443 with command-like parameters

SIEM Query:

source_ip=ROUTER_IP AND (url_path="/cgi-bin/gui.cgi" AND http_method="POST")

🔗 References

📤 Share & Export