CVE-2024-53945

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary operating system commands with root privileges on KuWFi 4G AC900 LTE routers. Attackers can achieve full system compromise by injecting shell metacharacters into HTTP API parameters. All users of the affected router version are at risk.

💻 Affected Systems

Products:
  • KuWFi 4G AC900 LTE router
Versions: 1.0.13
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authentication to the web interface, but default credentials may be used. Affects specific HTTP API endpoints /goform/formMultiApnSetting and /goform/atCmd.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router takeover enabling persistent remote access, network traffic interception, lateral movement to connected devices, and disabling of security controls.

🟠

Likely Case

Router compromise leading to unauthorized network access, credential theft, and installation of backdoors for persistent access.

🟢

If Mitigated

Limited impact if strong authentication controls prevent unauthorized access to the web interface.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, and authenticated access could be obtained through default credentials or other vulnerabilities.
🏢 Internal Only: MEDIUM - Internal attackers with network access could exploit this if they obtain authentication credentials.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication but is straightforward once authenticated. Public proof-of-concept exists in GitHub repositories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Contact vendor for firmware updates and monitor their security advisories.

🔧 Temporary Workarounds

Disable HTTP API endpoints

all

Block or disable access to vulnerable endpoints /goform/formMultiApnSetting and /goform/atCmd if possible through router configuration.

Change default credentials

all

Ensure strong, unique passwords are set for router administration to prevent unauthorized authentication.

🧯 If You Can't Patch

  • Isolate affected routers in network segments with strict firewall rules limiting inbound/outbound traffic
  • Implement network monitoring for suspicious HTTP requests to the vulnerable endpoints

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface. If version is 1.0.13, the device is vulnerable. Test authenticated requests to /goform/formMultiApnSetting or /goform/atCmd with shell metacharacters.

Check Version:

Check via router web interface under System Status or Administration settings

Verify Fix Applied:

Verify firmware version has been updated beyond 1.0.13. Test that command injection attempts no longer succeed.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /goform/formMultiApnSetting or /goform/atCmd containing shell metacharacters like ;, |, &, $, (, )

Network Indicators:

  • Unusual outbound connections from router, unexpected telnet/SSH services enabled

SIEM Query:

http.url:*goform/formMultiApnSetting* OR http.url:*goform/atCmd* AND (http.uri:*;* OR http.uri:*|* OR http.uri:*&* OR http.uri:*$* OR http.uri:*(* OR http.uri:*)*)

🔗 References

📤 Share & Export