CVE-2024-31152

5.3 MEDIUM

📋 TL;DR

The LevelOne WBR-6012 router with firmware R0.40e6 has an improper resource allocation vulnerability in its web application. Attackers can send crafted HTTP requests to cause the router to reboot, leading to network service interruptions. This affects users of this specific router model with the vulnerable firmware.

💻 Affected Systems

Products:
  • LevelOne WBR-6012 router
Versions: Firmware R0.40e6
Operating Systems: Embedded router OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific firmware version mentioned; other versions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Repeated exploitation could cause persistent denial of service, making the router unavailable for extended periods and disrupting all network connectivity.

🟠

Likely Case

Temporary network outages from router reboots, causing service interruptions for connected devices.

🟢

If Mitigated

Minimal impact if router is behind firewall with restricted web interface access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted HTTP requests to the web interface; no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Check vendor website for firmware updates. If available, download latest firmware and apply through router web interface.

🔧 Temporary Workarounds

Restrict web interface access

all

Limit access to router web interface to trusted IP addresses only

Disable remote management

all

Turn off remote management feature if not needed

🧯 If You Can't Patch

  • Replace router with supported model
  • Implement network segmentation to isolate router from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface under System Status or similar section

Check Version:

Not applicable - check via web interface

Verify Fix Applied:

Verify firmware version is no longer R0.40e6 after update

📡 Detection & Monitoring

Log Indicators:

  • Multiple HTTP requests to router web interface followed by reboot events
  • Unusual HTTP request patterns

Network Indicators:

  • HTTP traffic to router web interface with malformed requests
  • Router becoming unresponsive

SIEM Query:

source="router_logs" AND (event="reboot" OR event="http_request") | stats count by src_ip

🔗 References

📤 Share & Export