CVE-2024-54763

6.5 MEDIUM

📋 TL;DR

An unauthenticated access control vulnerability in ipTIME A2004 routers allows attackers to retrieve sensitive information via the /login/hostinfo.cgi endpoint. This affects organizations and individuals using ipTIME A2004 routers with firmware version 12.17.0. Attackers can exploit this without credentials to gather system information.

💻 Affected Systems

Products:
  • ipTIME A2004
Versions: v12.17.0
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default configuration of ipTIME A2004 routers with vulnerable firmware version.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain complete network topology, device configurations, and potentially credentials, leading to full network compromise and data exfiltration.

🟠

Likely Case

Unauthenticated attackers gather sensitive system information including network configurations, connected devices, and potentially administrative details.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to information disclosure from the router itself.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP GET request to vulnerable endpoint. Proof-of-concept available in GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

1. Check ipTIME website for firmware updates. 2. Download latest firmware. 3. Access router admin panel. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Verify update completed successfully.

🔧 Temporary Workarounds

Block External Access

linux

Prevent external access to router management interface

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Network Segmentation

all

Isolate router management interface to trusted network only

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to router management interface
  • Monitor network traffic for unauthorized access attempts to /login/hostinfo.cgi endpoint

🔍 How to Verify

Check if Vulnerable:

Send HTTP GET request to http://[router-ip]/login/hostinfo.cgi. If it returns sensitive information without authentication, device is vulnerable.

Check Version:

Check router web interface or use curl: curl -s http://[router-ip]/ | grep -i firmware

Verify Fix Applied:

After update, attempt same request. Should return authentication error or no sensitive data.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated requests to /login/hostinfo.cgi
  • Multiple failed authentication attempts followed by hostinfo access

Network Indicators:

  • HTTP GET requests to /login/hostinfo.cgi from untrusted sources
  • Unusual traffic patterns to router management interface

SIEM Query:

source="router_logs" AND url="/login/hostinfo.cgi" AND auth_status="failed"

🔗 References

📤 Share & Export