CVE-2024-39602

9.1 CRITICAL

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary commands on Wavlink AC3000 routers by sending specially crafted HTTP requests to the nas.cgi set_nas() functionality. Attackers with access to the router's web interface can achieve remote code execution. Only users of specific Wavlink AC3000 router models with vulnerable firmware are affected.

💻 Affected Systems

Products:
  • Wavlink AC3000 M33A8
Versions: V5030.210505 and earlier
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have authenticated access to the web interface. The vulnerability is in the NAS configuration functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing attackers to install persistent malware, intercept all network traffic, pivot to internal networks, and use the device as part of a botnet.

🟠

Likely Case

Attackers with access to the router's web interface gain full control of the device, potentially stealing credentials, redirecting DNS, or deploying cryptocurrency miners.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the router itself without lateral movement to other systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained. The Talos report includes technical details that could be weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No vendor advisory found

Restart Required: No

Instructions:

1. Check Wavlink website for firmware updates
2. If update available, download and install via web interface
3. Monitor for official patch release

🔧 Temporary Workarounds

Disable NAS functionality

all

Turn off NAS features in router configuration if not needed

Restrict web interface access

all

Limit access to router admin interface to trusted IPs only

🧯 If You Can't Patch

  • Isolate affected routers in separate network segment with strict firewall rules
  • Change default admin credentials and implement strong authentication

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface under System Status or About page

Check Version:

Check via web interface or SSH if enabled: cat /etc/version

Verify Fix Applied:

Verify firmware version is newer than V5030.210505

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to /cgi-bin/nas.cgi
  • Multiple failed login attempts followed by successful login and NAS configuration changes

Network Indicators:

  • HTTP requests with unusual parameters to set_nas() endpoint
  • Outbound connections from router to unexpected destinations

SIEM Query:

source="router_logs" AND (uri="/cgi-bin/nas.cgi" AND method="POST" AND params CONTAINS "set_nas")

🔗 References

📤 Share & Export