CVE-2024-54764

6.5 MEDIUM

📋 TL;DR

An unauthenticated access control vulnerability in ipTIME A2004 routers allows attackers to access sensitive information via the /login/hostinfo2.cgi endpoint. This affects users running vulnerable firmware versions, potentially exposing network configuration details without authentication.

💻 Affected Systems

Products:
  • ipTIME A2004
Versions: v12.17.0 (specific version mentioned, other versions may be affected)
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface component. Devices with default configurations are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could obtain network topology information, connected device details, and potentially use this information for further attacks or reconnaissance.

🟠

Likely Case

Unauthenticated attackers can gather sensitive network information about connected devices and configurations.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to information disclosure within the affected network segment.

🌐 Internet-Facing: HIGH - The vulnerability is unauthenticated and affects network devices that are often exposed to the internet.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this to gather network intelligence for lateral movement.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request to vulnerable endpoint. Public GitHub repository contains details and likely exploit code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check vendor website for firmware updates. If available, download and apply through router web interface.

🔧 Temporary Workarounds

Block External Access

all

Restrict access to router management interface from external networks

Configure firewall rules to block WAN access to port 80/443

Network Segmentation

all

Isolate router management interface to trusted network segment

Use VLANs or separate network for management access

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the router management interface
  • Monitor network traffic for unauthorized access attempts to /login/hostinfo2.cgi endpoint

🔍 How to Verify

Check if Vulnerable:

Attempt HTTP GET request to http://[router-ip]/login/hostinfo2.cgi without authentication. If it returns sensitive information, device is vulnerable.

Check Version:

Check router web interface or use curl: curl -s http://[router-ip]/ | grep -i version

Verify Fix Applied:

After applying any workarounds, repeat the test to confirm endpoint no longer returns sensitive data without authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access to /login/hostinfo2.cgi in web server logs
  • Multiple failed authentication attempts followed by access to hostinfo2.cgi

Network Indicators:

  • HTTP GET requests to /login/hostinfo2.cgi from untrusted sources
  • Unusual information gathering patterns from external IPs

SIEM Query:

source="router_logs" AND (url="/login/hostinfo2.cgi" AND NOT (user!="" OR auth_success="true"))

🔗 References

📤 Share & Export