CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-39800

High Severity
SVRS
42/100

CVSSv3
9.1/10

EPSS
0.00075/1

CVE-2024-39800 allows for arbitrary command execution on Wavlink AC3000 routers. This configuration injection vulnerability exists within the openvpn.cgi script, specifically in the openvpn_server_setup() function, making it a serious threat to network security. An attacker can exploit this vulnerability by sending a specially crafted HTTP request, gaining control over the device with elevated privileges. Although the CVSS score is high at 9.1, SOCRadar's Vulnerability Risk Score (SVRS) is 42, indicating a moderate risk level. This means while the vulnerability is significant, the immediate urgency for remediation might be lower compared to vulnerabilities with higher SVRS scores. Nevertheless, patching this vulnerability is crucial to prevent unauthorized access and maintain the integrity of the router. The risk includes complete system compromise, data theft, and potential use of the router in botnet attacks.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:H
UI:N
S:C
C:H
I:H
A:H
2025-01-14

2025-01-15
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-39800 is a critical vulnerability affecting the Wavlink AC3000 M33A8.V5030.210505 router. It involves multiple external configuration control vulnerabilities within the openvpn.cgi openvpn_server_setup() functionality. Exploiting these vulnerabilities allows attackers to execute arbitrary commands on the affected device through specially crafted HTTP requests. This vulnerability is particularly concerning as it leverages a configuration injection vulnerability in the open_port POST parameter, making it relatively easy for attackers to exploit.

While the CVSS score is high at 9.1, the SOCRadar Vulnerability Risk Score (SVRS) is 42, indicating a moderate risk level. However, the fact that this vulnerability is "In The Wild" emphasizes the urgency of addressing it.

Key Insights

  • Remote Code Execution: This vulnerability allows attackers to execute arbitrary commands on the affected device, giving them complete control over the router.
  • Configuration Injection: The vulnerability leverages a configuration injection flaw in the open_port parameter, enabling attackers to manipulate the device's configuration settings.
  • Authentication Bypass: While the CVE description mentions an authenticated request, the exploitability of this vulnerability may allow attackers to bypass authentication mechanisms, potentially making it easier to exploit.
  • Active Exploitation: The CVE-2024-39800 vulnerability is being actively exploited by hackers in the wild, meaning immediate action is crucial.

Mitigation Strategies

  • Firmware Update: The highest priority is to update the Wavlink AC3000 M33A8.V5030.210505 router to the latest firmware version. This patch should address the vulnerability.
  • Network Segmentation: Isolate the router from critical networks by implementing network segmentation. This restricts the impact of a successful exploit and limits the attacker's ability to move laterally within your network.
  • Security Auditing: Conduct regular security audits to identify and mitigate potential vulnerabilities within your network, including router configurations.
  • Intrusion Detection Systems (IDS): Deploy IDS solutions to detect malicious network traffic patterns that might indicate exploitation attempts targeting this vulnerability.

Additional Information

If you have additional queries regarding this incident, you can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

Slew of WavLink vulnerabilities
Kri Dontje2025-01-15
Slew of WavLink vulnerabilities | Lilith >_> of Cisco Talos discovered these vulnerabilities. Forty-four vulnerabilities and sixty-three CVEs were discovered across ten .cgi and three .sh files, as well as the static login page, of the Wavlink AC3000 wireless router web application.  The Wavlink AC3000 wireless router is one of theLilith >
feedburner.com
rss
forum
news
CVE-2024-39800 | Wavlink AC3000 M33A8.V5030.210505 openvpn.cgi openvpn_server_setup open_port external control of system or configuration setting (TALOS-2024-2050)
vuldb.com2025-01-14
CVE-2024-39800 | Wavlink AC3000 M33A8.V5030.210505 openvpn.cgi openvpn_server_setup open_port external control of system or configuration setting (TALOS-2024-2050) | A vulnerability was found in Wavlink AC3000 M33A8.V5030.210505 and classified as critical. Affected by this issue is the function openvpn_server_setup of the file openvpn.cgi. The manipulation of the argument open_port leads to external control of system or
vuldb.com
rss
forum
news

Social Media

CVE-2024-39800 Multiple external config control vulnerabilities exists in the openvpn.cgi openvpn_server_setup() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially craf… https://t.co/zNithvX8yM
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://talosintelligence.com/vulnerability_reports/TALOS-2024-2050
HTTPS://TALOSINTELLIGENCE.COM/VULNERABILITY_REPORTS/TALOS-2024-2050https://talosintelligence.com/vulnerability_reports/TALOS-2024-2050

CWE Details

CWE IDCWE NameDescription
CWE-15External Control of System or Configuration SettingOne or more system settings or configuration elements can be externally controlled by a user.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence