CVE-2024-8684

8.3 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in Revolution Pi devices that allows authenticated attackers to execute arbitrary operating system commands. The vulnerability exists in the 'php/dal.php' endpoint via the 'arrSaveConfig' parameter, potentially giving attackers full control of affected devices. Organizations using Revolution Pi version 2022-07-28-revpi-buster are affected.

💻 Affected Systems

Products:
  • Revolution Pi
Versions: 2022-07-28-revpi-buster
Operating Systems: RevPi OS (based on Debian Buster)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web interface. All installations with this specific version are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to install persistent backdoors, pivot to internal networks, exfiltrate sensitive data, or use device as part of botnet.

🟠

Likely Case

Attacker gains shell access to device, can modify configurations, install unauthorized software, and potentially access connected industrial control systems.

🟢

If Mitigated

With proper network segmentation and authentication controls, impact limited to isolated device with minimal sensitive data.

🌐 Internet-Facing: HIGH if device exposed to internet, as authenticated access could be obtained through other means or credential compromise.
🏢 Internal Only: MEDIUM as attacker needs authenticated access, but internal threats or compromised credentials could lead to exploitation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to the web interface. The vulnerability is in a specific PHP endpoint that processes configuration data.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check with KUNBUS for updated version

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-kunbus-gmbhs-revolution-pi

Restart Required: No

Instructions:

1. Contact KUNBUS GmbH for patched version 2. Backup current configuration 3. Apply vendor-provided update 4. Verify fix by testing the vulnerable endpoint

🔧 Temporary Workarounds

Disable vulnerable endpoint

all

Block or remove access to the vulnerable php/dal.php endpoint

sudo rm /var/www/html/php/dal.php
sudo chmod 000 /var/www/html/php/dal.php

Restrict web interface access

all

Limit access to Revolution Pi web interface to trusted IP addresses only

sudo ufw allow from TRUSTED_IP to any port 80,443
sudo ufw deny 80
sudo ufw deny 443

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Revolution Pi devices from critical systems
  • Enforce strong authentication policies and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check if file /var/www/html/php/dal.php exists and contains 'arrSaveConfig' parameter processing without proper input validation

Check Version:

cat /etc/revpi/image-release

Verify Fix Applied:

Test the vulnerable endpoint with controlled input to ensure command injection is no longer possible

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /php/dal.php
  • Suspicious command execution in system logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unexpected outbound connections from Revolution Pi device
  • Traffic to known malicious IPs or domains

SIEM Query:

source="revpi-logs" AND (url="/php/dal.php" OR process="bash" OR process="sh")

🔗 References

📤 Share & Export