OS Command Injection Vulnerability in Wavlink AC3000 Firewall
CVE-2024-39367

9.1CRITICAL

Key Information:

Vendor

Wavlink

Vendor
CVE Published:
14 January 2025

What is CVE-2024-39367?

An OS command injection vulnerability has been identified in the firewall.cgi iptablesWebsFilterRun() functionality of Wavlink AC3000 M33A8 devices. This vulnerability can be exploited when an attacker sends a specially crafted HTTP request, potentially leading to arbitrary code execution on the affected device. The attacker must authenticate themselves before triggering the vulnerability, emphasizing the need for robust security practices and timely updates to protect network infrastructure.

Affected Version(s)

Wavlink AC3000 M33A8.V5030.210505

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

Credit

Discovered by Lilith >_> of Cisco Talos.
.
CVE-2024-39367 : OS Command Injection Vulnerability in Wavlink AC3000 Firewall