Cyber Posture

CVE-2024-36258

CriticalPublic PoC

Published: 14 January 2025

Published
14 January 2025
Modified
21 August 2025
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.1648 94.9th percentile
Risk Priority 30 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-36258 is a critical-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Wavlink Wl-Wn533A8 Firmware. Its CVSS base score is 10.0 (Critical).

Operationally, ranked in the top 5.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires identification, reporting, and patching of the stack-based buffer overflow flaw in touchlist_sync.cgi to prevent arbitrary code execution.

prevent

Enforces validation of HTTP request inputs to block specially crafted requests that trigger the buffer overflow in touchlistsync().

prevent

Provides memory safeguards such as stack canaries and ASLR to mitigate exploitation of the stack-based buffer overflow vulnerability.

NVD Description

A stack-based buffer overflow vulnerability exists in the touchlist_sync.cgi touchlistsync() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can send an HTTP request to trigger this vulnerability.

Deeper analysisAI

A stack-based buffer overflow vulnerability, tracked as CVE-2024-36258 and associated with CWE-121, affects the touchlist_sync.cgi touchlistsync() functionality in Wavlink AC3000 routers running firmware version M33A8.V5030.210505. The issue arises when processing a specially crafted HTTP request, which can trigger the overflow and lead to arbitrary code execution.

The vulnerability carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating it is exploitable remotely over the network with low complexity, no required privileges or user interaction, and high impact across confidentiality, integrity, and availability due to a change in scope. Any unauthenticated attacker capable of sending an HTTP request to the affected device can trigger the buffer overflow to achieve arbitrary code execution, potentially compromising the router fully.

Mitigation details and technical analysis are provided in the Talos Intelligence advisory TALOS-2024-2046, available at https://talosintelligence.com/vulnerability_reports/TALOS-2024-2046. No patches or vendor-specific remediations are detailed in the available information.

Details

CWE(s)

Affected Products

wavlink
wl-wn533a8 firmware
m33a8.v5030.210505

CVEs Like This One

CVE-2024-36493Same product: Wavlink Wl-Wn533A8
CVE-2024-39757Same product: Wavlink Wl-Wn533A8
CVE-2024-39603Same product: Wavlink Wl-Wn533A8
CVE-2024-39357Same product: Wavlink Wl-Wn533A8
CVE-2024-39359Same product: Wavlink Wl-Wn533A8
CVE-2024-36290Same product: Wavlink Wl-Wn533A8
CVE-2024-39781Same product: Wavlink Wl-Wn533A8
CVE-2024-39795Same product: Wavlink Wl-Wn533A8
CVE-2024-39798Same product: Wavlink Wl-Wn533A8
CVE-2024-39784Same product: Wavlink Wl-Wn533A8

References