CVE-2024-40535

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 devices by exploiting a stack buffer overflow in the config_3g_para function via the apn_name_3g parameter. Attackers can potentially gain full control of affected devices. Organizations using these specific models are affected.

💻 Affected Systems

Products:
  • Shenzhen Libituo Technology Co., Ltd LBT-T300-T400
Versions: v3.2
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with 3G configuration functionality enabled. The vulnerability is in the firmware itself.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, lateral movement to internal networks, and persistent backdoor installation.

🟠

Likely Case

Device takeover enabling traffic interception, credential theft, and use as attack platform.

🟢

If Mitigated

Limited impact if devices are isolated in separate network segments with strict firewall rules.

🌐 Internet-Facing: HIGH - Devices exposed to internet are directly exploitable without authentication.
🏢 Internal Only: HIGH - Internal attackers or compromised systems can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available on GitHub. Exploitation requires sending specially crafted requests to the vulnerable parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Contact vendor Shenzhen Libituo Technology Co., Ltd for firmware updates.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices in separate VLAN with strict firewall rules

Disable 3G Configuration Interface

all

Disable or restrict access to the 3G configuration functionality if not required

🧯 If You Can't Patch

  • Remove devices from internet-facing positions immediately
  • Implement strict network access controls allowing only necessary traffic

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or CLI. If version is v3.2, device is vulnerable.

Check Version:

Check device web interface or use vendor-specific CLI commands

Verify Fix Applied:

Verify firmware has been updated to version newer than v3.2

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to config_3g_para endpoint
  • Large payloads in apn_name_3g parameter
  • Device crash/restart logs

Network Indicators:

  • Unusual traffic patterns to device management interface
  • Exploit payload patterns in network traffic

SIEM Query:

source_ip=* AND (uri_path="*config_3g_para*" OR parameter="*apn_name_3g*") AND payload_size>1000

🔗 References

📤 Share & Export