CVE-2024-39782

9.1 CRITICAL

📋 TL;DR

This CVE describes multiple OS command injection vulnerabilities in the Wavlink AC3000 router's web interface. Authenticated attackers can execute arbitrary commands on the device by sending specially crafted HTTP requests to the adm.cgi endpoint. This affects users of Wavlink AC3000 routers with vulnerable firmware.

💻 Affected Systems

Products:
  • Wavlink AC3000 M33A8
Versions: V5030.210505 and likely earlier versions
Operating Systems: Embedded Linux firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to web interface, but default credentials may be used.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing attacker to install persistent backdoors, intercept network traffic, pivot to internal networks, or brick the device.

🟠

Likely Case

Attacker gains root shell access on the router, enabling traffic interception, credential theft, and lateral movement to connected devices.

🟢

If Mitigated

Limited impact if network segmentation isolates the router and strong authentication prevents unauthorized access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authentication but default credentials or credential brute-forcing may bypass this.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Wavlink website for firmware updates
2. Download latest firmware for AC3000
3. Access router web interface
4. Navigate to firmware update section
5. Upload and apply new firmware
6. Reboot router

🔧 Temporary Workarounds

Disable web interface access

linux

Block access to router web interface from untrusted networks

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Change default credentials

all

Use strong, unique passwords for router admin access

🧯 If You Can't Patch

  • Isolate router on separate VLAN with strict firewall rules
  • Implement network monitoring for suspicious HTTP requests to adm.cgi

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface under System Status or About page

Check Version:

curl -s http://router-ip/cgi-bin/adm.cgi | grep -i version

Verify Fix Applied:

Verify firmware version is newer than V5030.210505

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /cgi-bin/adm.cgi with restart_min parameter
  • Unusual command execution in system logs

Network Indicators:

  • HTTP traffic to router port 80/443 containing shell metacharacters in POST data

SIEM Query:

source="router_logs" AND uri_path="/cgi-bin/adm.cgi" AND http_method="POST" AND (form_data CONTAINS "restart_min=" OR form_data CONTAINS ";" OR form_data CONTAINS "|" OR form_data CONTAINS "`")

🔗 References

📤 Share & Export