CVE-2024-25850

9.8 CRITICAL

📋 TL;DR

This CVE describes a command injection vulnerability in Netis WF2780 routers that allows attackers to execute arbitrary commands on the device by manipulating the wps_ap_ssid5g parameter. The vulnerability affects users of Netis WF2780 routers with vulnerable firmware versions. Successful exploitation could lead to complete compromise of the router.

💻 Affected Systems

Products:
  • Netis WF2780
Versions: v2.1.40144 and likely earlier versions
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface of the router. The vulnerability is in the WPS configuration functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router takeover allowing attackers to intercept all network traffic, deploy malware to connected devices, pivot to internal networks, and maintain persistent access.

🟠

Likely Case

Router compromise leading to network traffic interception, DNS hijacking, credential theft, and deployment of malware to connected devices.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted WAN access, though internal attackers could still exploit if they gain network access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication to the router's web interface. The GitHub reference shows detailed exploitation methodology.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.netis-systems.com/

Restart Required: Yes

Instructions:

1. Check Netis website for firmware updates
2. Download latest firmware for WF2780
3. Access router web interface
4. Navigate to firmware upgrade section
5. Upload and apply new firmware
6. Reboot router

🔧 Temporary Workarounds

Disable WPS functionality

all

Turn off WPS feature to remove vulnerable code path

Restrict web interface access

all

Limit access to router management interface to trusted IPs only

🧯 If You Can't Patch

  • Replace vulnerable router with a different model from a vendor with better security track record
  • Place router behind a firewall that blocks all inbound access to management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface. If version is v2.1.40144 or earlier, assume vulnerable.

Check Version:

Login to router web interface and check System Status or Firmware Version page

Verify Fix Applied:

After firmware update, verify version number has changed from v2.1.40144. Test WPS functionality to ensure it works without allowing command injection.

📡 Detection & Monitoring

Log Indicators:

  • Unusual commands in system logs
  • Multiple failed login attempts followed by WPS configuration changes
  • Suspicious processes running on router

Network Indicators:

  • Unusual outbound connections from router
  • DNS queries to malicious domains from router
  • Traffic redirection patterns

SIEM Query:

source="router_logs" AND ("wps_ap_ssid5g" OR "command injection" OR suspicious shell commands)

🔗 References

📤 Share & Export