CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-39787

High Severity
SVRS
42/100

CVSSv3
9.1/10

EPSS
0.00264/1

CVE-2024-39787 affects Wavlink AC3000 routers, allowing attackers to bypass permissions via directory traversal. Multiple directory traversal vulnerabilities are present in the nas.cgi add_dir() function, specifically via the disk_part POST parameter. An authenticated attacker can exploit these flaws by sending a specially crafted HTTP request. Although the CVSS score is high at 9.1, the SOCRadar Vulnerability Risk Score (SVRS) is 42, suggesting a lower real-world risk compared to the CVSS score alone. This permission bypass could enable unauthorized access to sensitive files and system resources. While the SVRS indicates it's not a critical vulnerability requiring immediate action, monitoring and patching are still recommended to mitigate potential risks on Wavlink AC3000 devices. The presence of the "In The Wild" tag suggests that exploits have been observed.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:H
UI:N
S:C
C:H
I:H
A:H
2025-01-14

2025-01-14
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-39787 is a critical directory traversal vulnerability affecting the Wavlink AC3000 M33A8.V5030.210505 model. This vulnerability stems from a flaw in the nas.cgi component's add_dir() functionality, where specially crafted HTTP requests can bypass permission checks. The vulnerability specifically lies within the disk_part POST parameter. While the CVSS score is 9.1, indicating a high severity, the SOCRadar Vulnerability Risk Score (SVRS) is 42, which suggests a moderate risk level.

Key Insights

  • Exploitation: The vulnerability is actively exploited "In The Wild," indicating that threat actors are using it to gain unauthorized access to systems.
  • Impact: Successful exploitation of this vulnerability could allow attackers to read, write, and execute arbitrary files on the affected device, potentially leading to data exfiltration, system compromise, and even complete control over the device.
  • Attack Vectors: The vulnerability can be exploited via specially crafted HTTP requests. This makes it accessible remotely, potentially enabling attackers to compromise devices without physical access.
  • Affected Systems: This vulnerability specifically targets the Wavlink AC3000 M33A8.V5030.210505 model. Users and organizations employing this device should prioritize patching and mitigation measures.

Mitigation Strategies

  • Patching: Immediately apply the latest security updates and patches released by Wavlink for the affected device. These patches should address the vulnerability and mitigate the risks.
  • Network Segmentation: Implement network segmentation to isolate the affected device from other sensitive systems, limiting the impact of a successful attack.
  • Input Validation: Ensure proper input validation and sanitization for HTTP requests and POST parameters to prevent the injection of malicious data that could trigger the vulnerability.
  • Intrusion Detection and Prevention Systems (IDS/IPS): Deploy and configure IDS/IPS systems to detect and block malicious traffic targeting this vulnerability.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

Slew of WavLink vulnerabilities
Kri Dontje2025-01-15
Slew of WavLink vulnerabilities | Lilith >_> of Cisco Talos discovered these vulnerabilities. Forty-four vulnerabilities and sixty-three CVEs were discovered across ten .cgi and three .sh files, as well as the static login page, of the Wavlink AC3000 wireless router web application.  The Wavlink AC3000 wireless router is one of theLilith >
feedburner.com
rss
forum
news
CVE-2024-39787 | Wavlink AC3000 M33A8.V5030.210505 nas.cgi add_dir disk_part path traversal (TALOS-2024-2057)
vuldb.com2025-01-14
CVE-2024-39787 | Wavlink AC3000 M33A8.V5030.210505 nas.cgi add_dir disk_part path traversal (TALOS-2024-2057) | A vulnerability, which was classified as critical, was found in Wavlink AC3000 M33A8.V5030.210505. This affects the function add_dir of the file nas.cgi. The manipulation of the argument disk_part leads to path traversal. This vulnerability is uniquely identified as <a href="https://vuldb.com/?source_cve.291585
vuldb.com
rss
forum
news

Social Media

CVE-2024-39787 Multiple directory traversal vulnerabilities exist in the nas.cgi add_dir() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can l… https://t.co/ixFd5WrAyV
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://talosintelligence.com/vulnerability_reports/TALOS-2024-2057
HTTPS://TALOSINTELLIGENCE.COM/VULNERABILITY_REPORTS/TALOS-2024-2057https://talosintelligence.com/vulnerability_reports/TALOS-2024-2057

CWE Details

CWE IDCWE NameDescription
CWE-22Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence