CVE-2024-39208

9.8 CRITICAL

📋 TL;DR

CVE-2024-39208 is a critical vulnerability in luci-app-lucky v2.8.3 that contains hardcoded credentials, allowing attackers to bypass authentication and gain unauthorized access. This affects all systems running the vulnerable version of this OpenWrt/LEDE web interface application. Attackers can potentially take full control of affected devices.

💻 Affected Systems

Products:
  • luci-app-lucky
Versions: v2.8.3 specifically
Operating Systems: OpenWrt, LEDE, Other Linux-based router/embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where luci-app-lucky is installed and enabled. The vulnerability exists in the application's source code with hardcoded credentials.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, install malware, pivot to other network devices, and maintain persistent access to the entire network infrastructure.

🟠

Likely Case

Unauthorized administrative access to the luci-app-lucky interface, enabling configuration changes, service disruption, and potential credential harvesting from the device.

🟢

If Mitigated

Limited impact if network segmentation prevents external access and strong authentication controls are in place for internal access.

🌐 Internet-Facing: HIGH - Any device with luci-app-lucky exposed to the internet can be trivially compromised using the hardcoded credentials.
🏢 Internal Only: HIGH - Even internally, any user on the network can exploit this vulnerability to gain administrative access without authentication.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is trivial - attackers simply need to use the hardcoded credentials documented in the references. No special tools or skills required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.8.4 or later

Vendor Advisory: https://github.com/yanggao017/vuln/blob/main/luci-app-lucky.md

Restart Required: Yes

Instructions:

1. Update luci-app-lucky to v2.8.4 or later via package manager. 2. Restart the luci service or reboot the device. 3. Change any passwords that may have been compromised.

🔧 Temporary Workarounds

Disable luci-app-lucky service

linux

Temporarily disable the vulnerable application until patching can be completed

/etc/init.d/luci-app-lucky stop
/etc/init.d/luci-app-lucky disable

Network access control

linux

Restrict network access to luci-app-lucky interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Immediately change all system passwords and SSH keys on affected devices
  • Implement strict network segmentation to isolate affected devices from critical infrastructure

🔍 How to Verify

Check if Vulnerable:

Check luci-app-lucky version: opkg list-installed | grep luci-app-lucky. If version is 2.8.3, the system is vulnerable.

Check Version:

opkg list-installed | grep luci-app-lucky

Verify Fix Applied:

Verify updated version: opkg list-installed | grep luci-app-lucky should show version 2.8.4 or later. Test authentication with previously known hardcoded credentials should fail.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful authentication
  • Authentication from unexpected IP addresses
  • Configuration changes without authorized user activity

Network Indicators:

  • HTTP/HTTPS requests to luci-app-lucky interface from suspicious sources
  • Unusual outbound connections from affected devices

SIEM Query:

source="luci.log" AND ("authentication success" OR "login successful") AND NOT user="authorized_user"

🔗 References

📤 Share & Export