CVE-2024-39763
Published: 14 January 2025
Summary
CVE-2024-39763 is a critical-severity Command Injection (CWE-77) vulnerability in Wavlink Wl-Wn533A8 Firmware. Its CVSS base score is 9.1 (Critical).
Operationally, ranked at the 42.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents OS command injection by validating the 'gateway' POST parameter in internet.cgi set_add_routing() to reject malicious payloads.
Remediates the specific command injection flaw in Wavlink AC3000 firmware via timely patching and updates.
Enforces least privilege to limit high-privilege access required for exploitation, reducing the attack surface for authenticated users.
NVD Description
Multiple OS command injection vulnerabilities exist in the internet.cgi set_add_routing() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection…
more
vulnerability exists in the `gateway` POST parameter.
Deeper analysisAI
CVE-2024-39763 consists of multiple OS command injection vulnerabilities (CWE-77) in the internet.cgi set_add_routing() functionality of the Wavlink AC3000 router running firmware version M33A8.V5030.210505. A specially crafted HTTP request targeting the `gateway` POST parameter can lead to arbitrary command execution on the device.
These vulnerabilities carry a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H). An authenticated attacker with high privileges can exploit them remotely over the network with low complexity by sending a malicious HTTP request, resulting in full arbitrary OS command execution and high-impact compromise of confidentiality, integrity, and availability across an expanded scope.
Mitigation details are available in the Talos Intelligence advisory at https://talosintelligence.com/vulnerability_reports/TALOS-2024-2020.
Details
- CWE(s)