CVE-2024-29243

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Shenzhen Libituo Technology Co., Ltd LBT-T300-mini devices by exploiting a buffer overflow in the vpn_client_ip parameter at /apply.cgi. Attackers can gain full control of affected devices without authentication. All users running version 1.2.9 of this specific device model are affected.

💻 Affected Systems

Products:
  • Shenzhen Libituo Technology Co., Ltd LBT-T300-mini
Versions: v1.2.9
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the web interface component and is accessible via HTTP requests to /apply.cgi.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to persistent backdoor installation, network pivoting, data exfiltration, and use in botnets or ransomware campaigns.

🟠

Likely Case

Remote code execution allowing attackers to install malware, steal credentials, or use the device as a foothold for lateral movement within the network.

🟢

If Mitigated

Limited impact if devices are isolated in separate VLANs with strict network segmentation and egress filtering.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub repository contains detailed exploitation information including proof-of-concept code. The CVSS 9.8 score indicates trivial exploitation with high impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

No official patch available. Check vendor website for firmware updates. If unavailable, implement workarounds immediately.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices in separate VLANs with strict firewall rules to prevent external and lateral access.

Access Control

linux

Block access to /apply.cgi endpoint at network perimeter or web application firewall.

iptables -A INPUT -p tcp --dport 80 -m string --string "/apply.cgi" --algo bm -j DROP

🧯 If You Can't Patch

  • Immediately disconnect affected devices from internet and critical networks
  • Replace vulnerable devices with secure alternatives if vendor support is unavailable

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or SSH. If version is 1.2.9, device is vulnerable.

Check Version:

curl -s http://device-ip/ | grep -i version

Verify Fix Applied:

Test if /apply.cgi endpoint still accepts malformed vpn_client_ip parameters using controlled testing.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to /apply.cgi with long vpn_client_ip parameters
  • Multiple failed buffer overflow attempts

Network Indicators:

  • HTTP traffic to /apply.cgi with unusually long parameter values
  • Unexpected outbound connections from device

SIEM Query:

source="device-ip" AND url="/apply.cgi" AND (parameter_length>100 OR status_code=500)

🔗 References

📤 Share & Export