Skip to main content

CVE-2024-1404: CWE-200 Information Disclosure in Linksys WRT54GL

Medium
VulnerabilityCVE-2024-1404cvecve-2024-1404cwe-200
Published: Fri Feb 09 2024 (02/09/2024, 22:31:04 UTC)
Source: CVE
Vendor/Project: Linksys
Product: WRT54GL

Description

A vulnerability was found in Linksys WRT54GL 4.30.18 and classified as problematic. Affected by this issue is some unknown functionality of the file /SysInfo.htm of the component Web Management Interface. The manipulation leads to information disclosure. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-253328. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/04/2025, 19:10:43 UTC

Technical Analysis

CVE-2024-1404 is an information disclosure vulnerability identified in the Linksys WRT54GL router, specifically affecting version 4.30.18 of its firmware. The vulnerability resides in the Web Management Interface component, particularly within the /SysInfo.htm file. This page likely exposes system information that should not be publicly accessible. The flaw allows an unauthenticated remote attacker to access sensitive information without requiring user interaction or privileges. The vulnerability is classified under CWE-200, which pertains to improper exposure of information to unauthorized actors. The CVSS v3.1 base score is 4.3, indicating a medium severity level. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or connected via a VPN or similar means. The attack complexity is low (AC:L), no privileges or user interaction are required, and the impact is limited to confidentiality loss without affecting integrity or availability. The vendor, Linksys, was contacted but has not responded or released a patch, and no official fixes are currently available. Although public exploit details have been disclosed, there are no known exploits actively used in the wild at this time. This vulnerability could allow attackers to gather sensitive configuration or system information that might facilitate further attacks or network reconnaissance.

Potential Impact

For European organizations using the Linksys WRT54GL router, this vulnerability poses a risk of unauthorized disclosure of sensitive device information. Such information could include network configuration details, firmware versions, or other system data that attackers can leverage to plan more targeted attacks. While the direct impact is limited to confidentiality, the exposure of internal network details can aid attackers in escalating privileges or bypassing security controls. This is particularly concerning for small and medium enterprises (SMEs) or home office environments that rely on this router model for network connectivity and may not have robust network segmentation or monitoring. The adjacent network attack vector means that attackers must have local network access, which could be achieved through compromised devices, malicious insiders, or unauthorized Wi-Fi access. In environments with lax wireless security or guest network isolation, the risk increases. The lack of vendor response and patches further exacerbates the threat, leaving affected devices vulnerable for an extended period. European organizations with critical infrastructure or sensitive data may face increased risk if attackers use this information disclosure as a stepping stone for more severe attacks.

Mitigation Recommendations

Given the absence of an official patch from Linksys, European organizations should implement compensating controls to mitigate this vulnerability. First, restrict access to the router's web management interface by limiting it to trusted IP addresses or VLANs and disabling remote management if enabled. Network segmentation should be enforced to isolate management interfaces from general user networks and guest Wi-Fi. Employ strong Wi-Fi security protocols (WPA3 or at least WPA2 with strong passwords) to prevent unauthorized local network access. Regularly monitor network traffic for unusual access patterns to the /SysInfo.htm page or other router management endpoints. Consider replacing the affected Linksys WRT54GL devices with newer, actively supported routers that receive timely security updates. If replacement is not immediately feasible, deploying an inline web application firewall (WAF) or network intrusion detection system (NIDS) capable of detecting and blocking suspicious requests to the router's management interface can provide additional protection. Finally, educate users about the risks of connecting unknown devices to the network and enforce strict access control policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-02-09T16:13:25.789Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec3ba

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:10:43 PM

Last updated: 7/27/2025, 6:52:55 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats