CVE-2024-33377
📋 TL;DR
This clickjacking vulnerability in LB-LINK BL-W1210M routers allows attackers to trick authenticated administrators into performing unintended actions by overlaying malicious elements on the login page. Attackers can manipulate victims to execute arbitrary operations like changing router settings or granting unauthorized access. Only users of this specific router model are affected.
💻 Affected Systems
- LB-LINK BL-W1210M
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could gain full administrative control of the router, reconfigure network settings, intercept traffic, or deploy malware to connected devices.
Likely Case
Attackers trick administrators into changing router configurations, potentially enabling unauthorized access or disrupting network services.
If Mitigated
With proper browser security headers and user awareness, impact is limited to unsuccessful clickjacking attempts.
🎯 Exploit Status
Exploitation requires social engineering to trick authenticated users into interacting with malicious pages.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Check vendor website for firmware updates.
🔧 Temporary Workarounds
Implement X-Frame-Options Header
allConfigure web server to prevent page loading in iframes
Add 'X-Frame-Options: DENY' or 'X-Frame-Options: SAMEORIGIN' to HTTP headers
Use Content Security Policy
allImplement CSP frame-ancestors directive to control framing
Add 'Content-Security-Policy: frame-ancestors 'none'' to HTTP headers
🧯 If You Can't Patch
- Restrict router administration interface to internal network only
- Educate users about clickjacking risks and safe browsing practices
🔍 How to Verify
Check if Vulnerable:
Access router admin page and check HTTP headers for X-Frame-Options or CSP frame-ancestors directives
Check Version:
Check firmware version in router web interface under System Status or About
Verify Fix Applied:
Verify X-Frame-Options: DENY or CSP frame-ancestors 'none' headers are present
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts from same IP
- Unusual configuration changes
Network Indicators:
- External access attempts to router admin interface
- Suspicious iframe loading patterns
SIEM Query:
source="router_logs" AND (event="config_change" OR event="admin_login")
🔗 References
- https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Clickjacking-%28CVE%E2%80%902024%E2%80%9033377%29
- https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-lb-link-bl-w1210m-router/
- https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Clickjacking-%28CVE%E2%80%902024%E2%80%9033377%29
- https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-lb-link-bl-w1210m-router/