Buffer Overflow Vulnerability in Wavlink AC3000 Router
CVE-2024-37184

9.1CRITICAL

Key Information:

Vendor

Wavlink

Vendor
CVE Published:
14 January 2025

What is CVE-2024-37184?

A vulnerability in the adm.cgi rep_as_bridge() functionality of the Wavlink AC3000 M33A8 router allows for stack-based buffer overflow. This issue arises when an attacker sends a specially crafted HTTP request. If the request is authenticated, it can trigger the overflow, potentially leading to unauthorized access or execution of arbitrary code on the device.

Affected Version(s)

Wavlink AC3000 M33A8.V5030.210505

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

Credit

Discovered by Lilith >_> of Cisco Talos.
.