CVE-2024-6144

8.8 HIGH

📋 TL;DR

This vulnerability allows network-adjacent attackers to execute arbitrary code on Actiontec WCB6200Q routers without authentication. The flaw exists in the HTTP server's handling of multipart boundaries, where improper length validation leads to stack-based buffer overflow. Attackers can exploit this to gain control of the router's HTTP server process.

💻 Affected Systems

Products:
  • Actiontec WCB6200Q
Versions: All versions prior to patch
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. The HTTP server runs on port 80 by default and requires no authentication for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing persistent backdoor installation, network traffic interception, lateral movement to connected devices, and router bricking.

🟠

Likely Case

Router compromise leading to network traffic monitoring, DNS hijacking, credential theft from connected devices, and denial of service.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, potentially only affecting the router's HTTP service availability.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network adjacency but no authentication. The vulnerability is well-documented in ZDI advisory with technical details that could facilitate exploit development.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor for latest firmware

Vendor Advisory: https://www.actiontec.com/support/security-advisories/

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to firmware update section. 3. Download latest firmware from Actiontec support site. 4. Upload and apply firmware update. 5. Reboot router after update completes.

🔧 Temporary Workarounds

Disable HTTP Management Interface

all

Disable the vulnerable HTTP server if not required for management

Router-specific: Access admin interface > Advanced Settings > Remote Management > Disable HTTP

Network Segmentation

all

Isolate router on separate VLAN to limit attack surface

Switch configuration: vlan 99
interface vlan 99
ip address 192.168.99.1 255.255.255.0

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to router management interface
  • Deploy network-based intrusion detection to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check router firmware version against vendor advisory. Test with controlled exploit if authorized.

Check Version:

Router-specific: Access admin interface > Status > Firmware Version

Verify Fix Applied:

Verify firmware version matches patched version from vendor. Test with vulnerability scanner if available.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests with multipart boundaries
  • HTTP server crash/restart logs
  • Unusual outbound connections from router

Network Indicators:

  • HTTP requests with crafted multipart boundaries to router port 80
  • Unusual traffic patterns from router to external IPs

SIEM Query:

source="router.logs" AND (http_request CONTAINS "multipart" OR http_status=500)

🔗 References

📤 Share & Export