CVE-2024-31976

8.0 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary operating system commands on EnGenius EWS356-FIR wireless access points via the Controller connectivity parameter. Attackers can gain full system control without authentication. Organizations using EnGenius EWS356-FIR devices are affected.

💻 Affected Systems

Products:
  • EnGenius EWS356-FIR
Versions: 1.1.30 and earlier
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to install persistent backdoors, pivot to internal networks, intercept all network traffic, and permanently brick devices.

🟠

Likely Case

Attackers gain shell access to modify device configuration, steal credentials, deploy malware, and use device as pivot point for lateral movement.

🟢

If Mitigated

If devices are behind firewalls with strict inbound filtering and network segmentation, impact is limited to device compromise without network pivot.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires sending crafted HTTP requests to vulnerable parameter. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.31 or later

Vendor Advisory: https://www.engeniustech.com/security-advisory/

Restart Required: Yes

Instructions:

1. Log into EnGenius cloud management portal. 2. Navigate to device management. 3. Check for firmware updates. 4. Apply firmware version 1.1.31 or later. 5. Reboot device after update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate EnGenius devices in separate VLAN with strict firewall rules blocking inbound access from untrusted networks.

Access Control Lists

all

Implement ACLs to restrict management interface access to trusted IP addresses only.

🧯 If You Can't Patch

  • Immediately isolate affected devices from internet and critical internal networks
  • Implement strict network monitoring for suspicious traffic to/from EnGenius devices

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or SSH. If version is 1.1.30 or earlier, device is vulnerable.

Check Version:

ssh admin@device_ip 'cat /etc/version' or check web interface System Status page

Verify Fix Applied:

Verify firmware version is 1.1.31 or later. Test Controller connectivity parameter with safe payload to confirm sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed login attempts followed by successful access
  • Unexpected configuration changes

Network Indicators:

  • HTTP POST requests to Controller connectivity endpoint with shell metacharacters
  • Outbound connections from device to suspicious IPs
  • Unusual port scanning from device

SIEM Query:

source="engenius-logs" AND (url="*controller*" AND (data="*;*" OR data="*|*" OR data="*`*"))

🔗 References

📤 Share & Export