CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-39801

High Severity
SVRS
42/100

CVSSv3
9.1/10

EPSS
0.00094/1

CVE-2024-39801 affects Wavlink AC3000 routers. This buffer overflow vulnerability allows remote attackers to execute arbitrary code via a crafted HTTP request.

CVE-2024-39801 describes multiple buffer overflow vulnerabilities within the qos.cgi qos_settings() function of Wavlink AC3000 M33A8.V5030.210505 routers. A specially crafted HTTP POST request targeting the qos_bandwidth parameter can trigger a stack-based buffer overflow. Although the CVSS score is high (9.1), the SOCRadar Vulnerability Risk Score (SVRS) is 42, indicating a moderate risk, but one that should still be addressed in a timely manner. An authenticated attacker can exploit this vulnerability to potentially execute arbitrary code on the device. This poses a significant risk of device compromise and network intrusion, necessitating prompt patching or mitigation. While not immediately critical, the presence of buffer overflows highlights potential security weaknesses in the device's firmware. Wavlink users should monitor for updates.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:H
UI:N
S:C
C:H
I:H
A:H
2025-01-14

2025-01-15
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-39801 is a critical vulnerability affecting the Wavlink AC3000 M33A8.V5030.210505 router. This vulnerability is a stack-based buffer overflow within the qos.cgi's qos_settings() functionality, specifically within the qos_bandwidth POST parameter. An attacker can exploit this vulnerability by sending a crafted HTTP request, potentially leading to code execution or denial of service. While the CVSS score is 9.1, the SOCRadar Vulnerability Risk Score (SVRS) is 42, indicating a moderate level of risk due to its specific context and the potential impact.

Key Insights

  • Remote Code Execution: The vulnerability allows an attacker to execute arbitrary code on the affected device with appropriate privileges, enabling them to gain complete control over the router.
  • Authenticated Attack: The vulnerability requires an attacker to be authenticated to the router, meaning it is less likely to be exploited in a mass-exploitation scenario. However, it still poses a serious threat to individual users and organizations.
  • Exploit in the Wild: CVE-2024-39801 is actively exploited by hackers in the wild, meaning it's not just a theoretical threat. This emphasizes the urgency of patching the vulnerability.
  • Targeted Attacks: The exploitability of CVE-2024-39801 likely makes it attractive for targeted attacks, where attackers aim to compromise specific routers for data exfiltration or network disruption.

Mitigation Strategies

  • Patching: Immediately apply the security patch provided by the vendor for CVE-2024-39801. This patch should address the vulnerability and prevent exploitation.
  • Network Segmentation: Implementing network segmentation can limit the impact of an attack, even if the router is compromised. It reduces the attacker's access to other devices on the network.
  • Change Default Credentials: Ensure that the router's default credentials are changed to strong, unique passwords to make it more difficult for attackers to gain initial access.
  • Intrusion Detection Systems (IDS): Deploy IDS solutions to detect potential malicious activities and alert administrators to suspicious traffic.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

Slew of WavLink vulnerabilities
Kri Dontje2025-01-15
Slew of WavLink vulnerabilities | Lilith >_> of Cisco Talos discovered these vulnerabilities. Forty-four vulnerabilities and sixty-three CVEs were discovered across ten .cgi and three .sh files, as well as the static login page, of the Wavlink AC3000 wireless router web application.  The Wavlink AC3000 wireless router is one of theLilith >
feedburner.com
rss
forum
news
CVE-2024-39801 | Wavlink AC3000 M33A8.V5030.210505 qos.cgi qos_settings qos_bandwidth buffer overflow (TALOS-2024-2049)
vuldb.com2025-01-14
CVE-2024-39801 | Wavlink AC3000 M33A8.V5030.210505 qos.cgi qos_settings qos_bandwidth buffer overflow (TALOS-2024-2049) | A vulnerability classified as critical has been found in Wavlink AC3000 M33A8.V5030.210505. Affected is the function qos_settings of the file qos.cgi. The manipulation of the argument qos_bandwidth leads to buffer overflow. This vulnerability is traded as CVE
vuldb.com
rss
forum
news

Social Media

CVE-2024-39801 Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can … https://t.co/oJ4ziOxIgW
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://talosintelligence.com/vulnerability_reports/TALOS-2024-2049
HTTPS://TALOSINTELLIGENCE.COM/VULNERABILITY_REPORTS/TALOS-2024-2049https://talosintelligence.com/vulnerability_reports/TALOS-2024-2049

CWE Details

CWE IDCWE NameDescription
CWE-120Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence