CVE-2024-28011

9.8 CRITICAL

📋 TL;DR

This CVE describes a critical hidden functionality vulnerability in multiple NEC Aterm router models that allows unauthenticated remote attackers to execute arbitrary operating system commands with root privileges via the internet. All listed router models in all versions are affected, making this a widespread risk for organizations using these devices.

💻 Affected Systems

Products:
  • NEC Corporation Aterm WG1800HP4
  • WG1200HS3
  • WG1900HP2
  • WG1200HP3
  • WG1800HP3
  • WG1200HS2
  • WG1900HP
  • WG1200HP2
  • W1200EX(-MS)
  • WG1200HS
  • WG1200HP
  • WF300HP2
  • W300P
  • WF800HP
  • WR8165N
  • WG2200HP
  • WF1200HP2
  • WG1800HP2
  • WF1200HP
  • WG600HP
  • WG300HP
  • WF300HP
  • WG1800HP
  • WG1400HP
  • WR8175N
  • WR9300N
  • WR8750N
  • WR8160N
  • WR9500N
  • WR8600N
  • WR8370N
  • WR8170N
  • WR8700N
  • WR8300N
  • WR8150N
  • WR4100N
  • WR4500N
  • WR8100N
  • WR8500N
  • CR2500P
  • WR8400N
  • WR8200N
  • WR1200H
  • WR7870S
  • WR6670S
  • WR7850S
  • WR6650S
  • WR6600H
  • WR7800H
  • WM3400RN
  • WM3450RN
  • WM3500R
  • WM3600R
  • WM3800R
  • WR8166N
  • MR01LN
  • MR02LN
  • WG1810HP(JE)
  • WG1810HP(MF)
Versions: All versions
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All listed models in all firmware versions are vulnerable. The vulnerability is exploitable via the internet interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router with root access, allowing attackers to intercept all network traffic, pivot to internal networks, install persistent malware, or use the device as part of a botnet.

🟠

Likely Case

Attackers gain full control of the router to monitor network traffic, steal credentials, redirect DNS, or use the device for further attacks on the internal network.

🟢

If Mitigated

If properly segmented and monitored, impact could be limited to the router itself, though credential theft and initial access to the network would still be possible.

🌐 Internet-Facing: HIGH - The vulnerability is explicitly exploitable via the internet without authentication.
🏢 Internal Only: HIGH - Once compromised, the router provides a foothold in the internal network for lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description indicates it can be exploited via the internet without authentication, suggesting low complexity exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific firmware updates

Vendor Advisory: https://jpn.nec.com/security-info/secinfo/nv24-001_en.html

Restart Required: Yes

Instructions:

1. Visit the NEC security advisory page. 2. Identify your specific router model. 3. Download the latest firmware from NEC's support site. 4. Log into router admin interface. 5. Navigate to firmware update section. 6. Upload and apply the new firmware. 7. Reboot the router.

🔧 Temporary Workarounds

Disable WAN Management

all

Disable remote management/administration from the internet to prevent exploitation

Network Segmentation

all

Place affected routers in a DMZ or isolated network segment to limit potential damage

🧯 If You Can't Patch

  • Replace affected routers with non-vulnerable models immediately
  • Implement strict network segmentation and firewall rules to isolate the router from critical internal resources

🔍 How to Verify

Check if Vulnerable:

Check if your router model is in the affected products list. All versions of listed models are vulnerable.

Check Version:

Log into router admin interface and check firmware version in system status or about page

Verify Fix Applied:

After updating firmware, verify the version matches or exceeds the patched version specified in the vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual login attempts to router admin interface
  • Unexpected firmware update attempts
  • Suspicious command execution in router logs

Network Indicators:

  • Unusual outbound connections from router
  • DNS hijacking or redirection
  • Unexpected traffic patterns from router

SIEM Query:

source="router_logs" AND ("command execution" OR "root access" OR "unauthorized access")

🔗 References

📤 Share & Export