CVE-2024-29243
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code on Shenzhen Libituo Technology Co., Ltd LBT-T300-mini devices by exploiting a buffer overflow in the vpn_client_ip parameter at /apply.cgi. Attackers can gain full control of affected devices without authentication. All users running version 1.2.9 of this specific device model are affected.
💻 Affected Systems
- Shenzhen Libituo Technology Co., Ltd LBT-T300-mini
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise leading to persistent backdoor installation, network pivoting, data exfiltration, and use in botnets or ransomware campaigns.
Likely Case
Remote code execution allowing attackers to install malware, steal credentials, or use the device as a foothold for lateral movement within the network.
If Mitigated
Limited impact if devices are isolated in separate VLANs with strict network segmentation and egress filtering.
🎯 Exploit Status
The GitHub repository contains detailed exploitation information including proof-of-concept code. The CVSS 9.8 score indicates trivial exploitation with high impact.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None found
Restart Required: No
Instructions:
No official patch available. Check vendor website for firmware updates. If unavailable, implement workarounds immediately.
🔧 Temporary Workarounds
Network Segmentation
allIsolate affected devices in separate VLANs with strict firewall rules to prevent external and lateral access.
Access Control
linuxBlock access to /apply.cgi endpoint at network perimeter or web application firewall.
iptables -A INPUT -p tcp --dport 80 -m string --string "/apply.cgi" --algo bm -j DROP
🧯 If You Can't Patch
- Immediately disconnect affected devices from internet and critical networks
- Replace vulnerable devices with secure alternatives if vendor support is unavailable
🔍 How to Verify
Check if Vulnerable:
Check device firmware version via web interface or SSH. If version is 1.2.9, device is vulnerable.
Check Version:
curl -s http://device-ip/ | grep -i version
Verify Fix Applied:
Test if /apply.cgi endpoint still accepts malformed vpn_client_ip parameters using controlled testing.
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP POST requests to /apply.cgi with long vpn_client_ip parameters
- Multiple failed buffer overflow attempts
Network Indicators:
- HTTP traffic to /apply.cgi with unusually long parameter values
- Unexpected outbound connections from device
SIEM Query:
source="device-ip" AND url="/apply.cgi" AND (parameter_length>100 OR status_code=500)