CVE-2024-28014

9.8 CRITICAL

📋 TL;DR

This CVE describes a critical stack-based buffer overflow vulnerability in multiple NEC Aterm router models that allows remote attackers to execute arbitrary commands via the internet. The vulnerability affects all versions of the listed devices and has a CVSS score of 9.8, indicating critical severity. Attackers can exploit this without authentication to gain complete control of affected routers.

💻 Affected Systems

Products:
  • NEC Corporation Aterm WG1800HP4
  • WG1200HS3
  • WG1900HP2
  • WG1200HP3
  • WG1800HP3
  • WG1200HS2
  • WG1900HP
  • WG1200HP2
  • W1200EX(-MS)
  • WG1200HS
  • WG1200HP
  • WF300HP2
  • W300P
  • WF800HP
  • WR8165N
  • WG2200HP
  • WF1200HP2
  • WG1800HP2
  • WF1200HP
  • WG600HP
  • WG300HP
  • WF300HP
  • WG1800HP
  • WG1400HP
  • WR8175N
  • WR9300N
  • WR8750N
  • WR8160N
  • WR9500N
  • WR8600N
  • WR8370N
  • WR8170N
  • WR8700N
  • WR8300N
  • WR8150N
  • WR4100N
  • WR4500N
  • WR8100N
  • WR8500N
  • CR2500P
  • WR8400N
  • WR8200N
  • WR1200H
  • WR7870S
  • WR6670S
  • WR7850S
  • WR6650S
  • WR6600H
  • WR7800H
  • WM3400RN
  • WM3450RN
  • WM3500R
  • WM3600R
  • WM3800R
  • WR8166N
  • MR01LN
  • MR02LN
  • WG1810HP(JE)
  • WG1810HP(MF)
Versions: All versions
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All listed router models in their default configurations are vulnerable. The vulnerability affects the web interface/management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing attackers to intercept all network traffic, install persistent malware, pivot to internal networks, and permanently brick devices.

🟠

Likely Case

Attackers gain remote code execution to use routers as botnet nodes, steal credentials, perform man-in-the-middle attacks, and disrupt network services.

🟢

If Mitigated

With proper network segmentation and firewall rules, impact is limited to the router itself, though attackers could still disrupt internet connectivity.

🌐 Internet-Facing: HIGH - The vulnerability is explicitly exploitable via the internet and affects internet-facing routers.
🏢 Internal Only: MEDIUM - While the advisory mentions internet exploitation, internal attackers could potentially exploit if they gain network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The advisory states exploitation is possible via the internet without authentication. Stack-based buffer overflows typically have low exploitation complexity when details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific firmware versions

Vendor Advisory: https://jpn.nec.com/security-info/secinfo/nv24-001_en.html

Restart Required: Yes

Instructions:

1. Visit the NEC security advisory page
2. Identify your specific router model
3. Download the latest firmware from NEC's support site
4. Log into router admin interface
5. Navigate to firmware update section
6. Upload and apply the new firmware
7. Reboot the router

🔧 Temporary Workarounds

Disable Internet Management

all

Prevent remote access to router management interface from the internet

Log into router admin interface
Navigate to remote management/administration settings
Disable 'Allow remote management' or similar option
Ensure management is only accessible from LAN

Network Segmentation

all

Isolate vulnerable routers from critical internal networks

Configure VLANs to separate router management traffic
Implement firewall rules to restrict router access
Place routers in dedicated network segments

🧯 If You Can't Patch

  • Immediately disable WAN-side management access to the router
  • Replace vulnerable routers with patched or different models if firmware updates are unavailable

🔍 How to Verify

Check if Vulnerable:

Check router model against affected list and verify firmware version is not patched via admin interface

Check Version:

Log into router web interface and check firmware version in status/system information page

Verify Fix Applied:

Verify firmware version matches or exceeds patched version listed in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts to router admin interface
  • Multiple failed login attempts followed by successful access
  • Unexpected configuration changes
  • Unusual outbound connections from router

Network Indicators:

  • Unusual traffic patterns to/from router management ports
  • Exploit attempt patterns in web traffic to router
  • Unexpected open ports on router

SIEM Query:

source_ip="router_ip" AND (http_user_agent CONTAINS "exploit" OR http_request CONTAINS "buffer" OR http_request CONTAINS "overflow")

🔗 References

📤 Share & Export