CVE-2024-54751

9.8 CRITICAL

📋 TL;DR

COMFAST CF-WR630AX routers version 2.7.0.2 contain a hardcoded root password in /etc/shadow, allowing attackers to gain complete administrative control. This affects all devices running this vulnerable firmware version. Attackers can use this password to log in as root without authentication.

💻 Affected Systems

Products:
  • COMFAST CF-WR630AX
Versions: v2.7.0.2
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with this firmware version are vulnerable out-of-the-box. No special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to intercept all network traffic, install persistent malware, pivot to internal networks, and brick the device.

🟠

Likely Case

Attackers gain root access to modify configurations, intercept sensitive data, and use the device as a foothold for further attacks.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the device itself, though it still provides a foothold.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing, making them directly accessible to attackers worldwide.
🏢 Internal Only: MEDIUM - If not internet-facing, attackers would need internal network access first, but once compromised it provides lateral movement opportunities.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attackers simply need to attempt SSH/Telnet login with the hardcoded password. No special tools or skills required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: Yes

Instructions:

1. Check COMFAST website for firmware updates. 2. If available, download and flash new firmware. 3. Factory reset device after update. 4. Change all passwords.

🔧 Temporary Workarounds

Change root password

linux

Manually change the root password via SSH/Telnet if accessible

passwd root

Disable remote management

all

Turn off SSH/Telnet/WEB management from WAN interface

🧯 If You Can't Patch

  • Isolate device in separate VLAN with strict firewall rules
  • Implement network monitoring for suspicious authentication attempts

🔍 How to Verify

Check if Vulnerable:

SSH/Telnet to device and attempt login with hardcoded password (check reference for specific password)

Check Version:

cat /etc/version or check web interface

Verify Fix Applied:

Attempt to login with old hardcoded password - should fail. Verify firmware version is updated.

📡 Detection & Monitoring

Log Indicators:

  • Failed SSH/Telnet login attempts
  • Successful root login from unusual IPs
  • Configuration changes

Network Indicators:

  • SSH/Telnet connections to router from external IPs
  • Unusual outbound connections from router

SIEM Query:

source="router_logs" (event="authentication success" user="root") OR (event="configuration change")

🔗 References

📤 Share & Export