CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-39785

High Severity
SVRS
42/100

CVSSv3
9.1/10

EPSS
0.00082/1

CVE-2024-39785 affects Wavlink AC3000 routers, allowing arbitrary command execution. A malicious actor can exploit this vulnerability through a crafted HTTP request, injecting commands via the adddir_name parameter. The command injection vulnerability resides in the nas.cgi add_dir() function. Although the CVSS score is high at 9.1, the SOCRadar Vulnerability Risk Score (SVRS) is 42, suggesting a lower immediate threat level compared to vulnerabilities with SVRS scores above 80. Nevertheless, the potential for remote code execution makes this a significant security risk. Successful exploitation could lead to complete system compromise, potentially granting attackers control over the affected device and network. Users should apply available patches or mitigations promptly. The vulnerability highlights the importance of robust input validation in web applications to prevent command injection attacks.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:H
UI:N
S:C
C:H
I:H
A:H
2025-01-14

2025-01-14
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-39785 describes multiple command execution vulnerabilities present in the nas.cgi add_dir() functionality of the Wavlink AC3000 M33A8.V5030.210505 router. These vulnerabilities allow an attacker to execute arbitrary commands on the affected device by sending a specially crafted HTTP request. The vulnerability is triggered by a command injection vulnerability in the adddir_name POST parameter. While the CVSS score is high at 9.1, the SOCRadar Vulnerability Risk Score (SVRS) is 42, indicating a moderate vulnerability requiring attention.

Key Insights

  • Remote Code Execution: The vulnerabilities allow an attacker to remotely execute commands on the affected device, potentially gaining full control over the system.
  • Authenticated Attack: Although authentication is required, this doesn't necessarily prevent exploitation. An attacker with legitimate credentials or who has compromised a user account can exploit these vulnerabilities.
  • Widely Used Device: The affected router is a popular model, increasing the potential impact of this vulnerability.
  • Active Exploitation: The "In The Wild" tag indicates that attackers are actively exploiting these vulnerabilities.

Mitigation Strategies

  • Firmware Update: Update the firmware on the affected router to the latest version, which will patch these vulnerabilities.
  • Network Segmentation: Isolate the router from other sensitive devices on the network to limit the impact of a successful attack.
  • Strong Passwords: Implement strong and unique passwords for the router and all connected accounts.
  • Multi-Factor Authentication (MFA): Enable MFA for all router and connected accounts to enhance security.

Additional Information

If users have additional queries regarding this incident, they can use the "Ask to Analyst" feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

Slew of WavLink vulnerabilities
Kri Dontje2025-01-15
Slew of WavLink vulnerabilities | Lilith >_> of Cisco Talos discovered these vulnerabilities. Forty-four vulnerabilities and sixty-three CVEs were discovered across ten .cgi and three .sh files, as well as the static login page, of the Wavlink AC3000 wireless router web application.  The Wavlink AC3000 wireless router is one of theLilith >
feedburner.com
rss
forum
news
CVE-2024-39785 | Wavlink AC3000 M33A8.V5030.210505 nas.cgi add_dir adddir_name injection (TALOS-2024-2058)
vuldb.com2025-01-14
CVE-2024-39785 | Wavlink AC3000 M33A8.V5030.210505 nas.cgi add_dir adddir_name injection (TALOS-2024-2058) | A vulnerability, which was classified as critical, has been found in Wavlink AC3000 M33A8.V5030.210505. Affected by this issue is the function add_dir of the file nas.cgi. The manipulation of the argument adddir_name leads to injection. This vulnerability is handled as <a href="https://vuldb.com
vuldb.com
rss
forum
news

Social Media

CVE-2024-39785 Multiple command execution vulnerabilities exist in the nas.cgi add_dir() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lea… https://t.co/t0GvcQBFvu
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://talosintelligence.com/vulnerability_reports/TALOS-2024-2058
HTTPS://TALOSINTELLIGENCE.COM/VULNERABILITY_REPORTS/TALOS-2024-2058https://talosintelligence.com/vulnerability_reports/TALOS-2024-2058

CWE Details

CWE IDCWE NameDescription
CWE-74Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence