Cyber Posture

CVE-2024-39608

CriticalPublic PoC

Published: 14 January 2025

Published
14 January 2025
Modified
21 August 2025
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0026 49.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-39608 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Wavlink Wl-Wn533A8 Firmware. Its CVSS base score is 10.0 (Critical).

Operationally, ranked at the 49.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and CM-5 (Access Restrictions for Change).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Access Enforcement requires logical access authorizations, directly preventing unauthenticated arbitrary firmware updates via login.cgi.

prevent

Access Restrictions for Change limits firmware updates to authorized roles and processes, mitigating unauthorized HTTP-triggered updates.

preventdetect

Software, Firmware, and Information Integrity monitors and verifies firmware against unauthorized changes from malicious updates.

NVD Description

A firmware update vulnerability exists in the login.cgi functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary firmware update. An attacker can send an unauthenticated message to trigger this vulnerability.

Deeper analysisAI

CVE-2024-39608 is a firmware update vulnerability in the login.cgi functionality of the Wavlink AC3000 router running firmware version M33A8.V5030.210505. The issue stems from CWE-306 (Missing Authentication for Critical Function), where a specially crafted HTTP request enables arbitrary firmware updates without proper validation. This flaw has a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, lack of privileges or user interaction required, and potential for scope change with high impacts across confidentiality, integrity, and availability.

Any unauthenticated attacker with network access to the affected device can exploit this vulnerability by sending a malicious HTTP request to the login.cgi endpoint, triggering an arbitrary firmware update. Successful exploitation allows the attacker to install malicious firmware, potentially leading to full device compromise, persistent access, data theft, or use as a pivot point in the network.

Mitigation details are provided in the Talos Intelligence advisory at https://talosintelligence.com/vulnerability_reports/TALOS-2024-2036, which documents the vulnerability and recommends applying vendor patches or firmware updates when available, along with network segmentation and exposure controls for the affected devices.

Details

CWE(s)

Affected Products

wavlink
wl-wn533a8 firmware
m33a8.v5030.210505

CVEs Like This One

CVE-2024-39273Same product: Wavlink Wl-Wn533A8
CVE-2024-36290Same product: Wavlink Wl-Wn533A8
CVE-2024-39781Same product: Wavlink Wl-Wn533A8
CVE-2024-39795Same product: Wavlink Wl-Wn533A8
CVE-2024-39798Same product: Wavlink Wl-Wn533A8
CVE-2024-39784Same product: Wavlink Wl-Wn533A8
CVE-2024-36493Same product: Wavlink Wl-Wn533A8
CVE-2024-36258Same product: Wavlink Wl-Wn533A8
CVE-2024-39757Same product: Wavlink Wl-Wn533A8
CVE-2024-38666Same product: Wavlink Wl-Wn533A8

References