CVE-2024-46327

5.7 MEDIUM

📋 TL;DR

This directory traversal vulnerability in VONETS VAP11G-300 routers allows attackers to access sensitive files by manipulating HTTP requests. Attackers can potentially read system files, configuration data, or other sensitive information stored on the device. This affects all users running the vulnerable firmware version.

💻 Affected Systems

Products:
  • VONETS VAP11G-300
Versions: v3.3.23.6.9
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific firmware version mentioned; other versions may also be vulnerable but unconfirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to administrative credentials, device configuration secrets, or other sensitive system files, potentially leading to complete device compromise and network infiltration.

🟠

Likely Case

Attackers read configuration files containing network settings, potentially enabling further attacks or information gathering about the network environment.

🟢

If Mitigated

Limited information disclosure with no authentication bypass or remote code execution capabilities.

🌐 Internet-Facing: HIGH - These devices are often deployed as internet-facing access points, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - If only accessible internally, risk is reduced but still significant for lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory traversal vulnerabilities typically require minimal technical skill to exploit once the vulnerability details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: Yes

Instructions:

1. Check VONETS website for firmware updates
2. Download latest firmware if available
3. Upload via device web interface
4. Reboot device after update

🔧 Temporary Workarounds

Network Segmentation

all

Isolate VAP11G-300 devices from sensitive networks and restrict access

Access Control Lists

linux

Implement firewall rules to restrict HTTP access to trusted IPs only

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Deploy network-based intrusion detection to monitor for directory traversal patterns
  • Consider replacing vulnerable devices with supported alternatives

🔍 How to Verify

Check if Vulnerable:

Check device firmware version in web interface or via SSH if enabled

Check Version:

Check web interface at http://device-ip/status or similar admin page

Verify Fix Applied:

Verify firmware version is updated beyond v3.3.23.6.9

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' patterns
  • Unusual file access attempts in web server logs

Network Indicators:

  • HTTP requests with directory traversal sequences to device IP

SIEM Query:

http.url:*../* AND dst_ip:VAP11G-300_IP

🔗 References

📤 Share & Export