CVE-2024-34544

9.1 CRITICAL

📋 TL;DR

This CVE describes a command injection vulnerability in the Wavlink AC3000 router's wireless.cgi AddMac() function. An authenticated attacker can execute arbitrary commands on the device by sending a specially crafted HTTP request. This affects users of Wavlink AC3000 routers with vulnerable firmware.

💻 Affected Systems

Products:
  • Wavlink AC3000
Versions: M33A8.V5030.210505
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web interface. Default credentials may be used if not changed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing attacker to install persistent backdoors, intercept network traffic, pivot to internal networks, or brick the device.

🟠

Likely Case

Attacker gains shell access to execute commands, potentially stealing credentials, modifying configurations, or launching attacks against internal systems.

🟢

If Mitigated

With proper network segmentation and access controls, impact limited to the router itself without lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authentication but is straightforward once authenticated. Public technical details available in Talos report.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Wavlink website for firmware updates. 2. Download latest firmware. 3. Log into router admin interface. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Disable remote administration

all

Prevent external access to router web interface

Change default credentials

all

Use strong unique passwords for admin access

🧯 If You Can't Patch

  • Segment router on isolated network segment
  • Implement strict firewall rules to limit access to router management interface

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface under System Status or About page

Check Version:

curl -s http://router-ip/cgi-bin/wireless.cgi | grep version

Verify Fix Applied:

Verify firmware version is newer than M33A8.V5030.210505

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to wireless.cgi with shell metacharacters
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • HTTP requests containing shell commands in parameters
  • Unusual outbound connections from router

SIEM Query:

source="router_logs" AND (uri="/cgi-bin/wireless.cgi" AND (param="AddMac" AND (value="*;*" OR value="*|*" OR value="*`*")))

🔗 References

📤 Share & Export