CVE-2024-45827

8.0 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in the RP562B Mesh Wi-Fi router firmware. Network-adjacent authenticated attackers can execute arbitrary operating system commands on affected devices. This affects users of RP562B routers running firmware v1.0.2 or earlier.

💻 Affected Systems

Products:
  • RP562B Mesh Wi-Fi Router
Versions: v1.0.2 and earlier
Operating Systems: Embedded Linux firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires network adjacency and authentication, but default configurations may be vulnerable if attacker gains legitimate access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to install persistent backdoors, intercept all network traffic, pivot to other network devices, or brick the router.

🟠

Likely Case

Attacker gains shell access to router, modifies network settings, steals credentials, or uses router as pivot point for internal network attacks.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and monitoring preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but command injection vulnerabilities are typically straightforward to exploit once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.0.3 or later

Vendor Advisory: https://jvn.jp/en/vu/JVNVU90676195/

Restart Required: Yes

Instructions:

1. Check current firmware version via router admin interface. 2. Download latest firmware from manufacturer website. 3. Upload firmware through admin interface. 4. Wait for automatic reboot. 5. Verify new firmware version.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate router management interface to separate VLAN or restrict access to trusted IPs only.

Strong Authentication

all

Implement multi-factor authentication or complex passwords for router admin access.

🧯 If You Can't Patch

  • Replace affected routers with patched or different models
  • Implement strict network access controls and monitor for suspicious router management traffic

🔍 How to Verify

Check if Vulnerable:

Access router admin interface and check firmware version in System Information section.

Check Version:

Check via web interface at http://router-ip/admin or via SSH if enabled: cat /etc/version

Verify Fix Applied:

Confirm firmware version is v1.0.3 or later in router admin interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts followed by successful login
  • Unexpected configuration changes

Network Indicators:

  • Unusual outbound connections from router
  • Suspicious traffic patterns from router management interface

SIEM Query:

source="router_logs" AND (event="command_execution" OR event="config_change") AND user!="admin"

🔗 References

📤 Share & Export