CVE-2024-1405: CWE-200 Information Disclosure in Linksys WRT54GL
A vulnerability was found in Linksys WRT54GL 4.30.18. It has been classified as problematic. This affects an unknown part of the file /wlaninfo.htm of the component Web Management Interface. The manipulation leads to information disclosure. The exploit has been disclosed to the public and may be used. The identifier VDB-253329 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2024-1405 is an information disclosure vulnerability identified in the Linksys WRT54GL router, specifically version 4.30.18. The vulnerability resides in the Web Management Interface component, within the /wlaninfo.htm file. An attacker can exploit this flaw to retrieve sensitive information from the device without requiring authentication or user interaction. The vulnerability is classified under CWE-200, indicating that it allows unauthorized disclosure of information that could aid further attacks or compromise user privacy. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is adjacent network (AV:A), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. The vendor, Linksys, has not responded to early disclosure attempts, and no patches or mitigations have been officially released. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. Given the widespread use of the WRT54GL model in home and small office environments, this vulnerability could expose network configuration details or other sensitive data to nearby attackers or compromised devices on the local network segment.
Potential Impact
For European organizations, especially small businesses and home offices relying on the Linksys WRT54GL router, this vulnerability poses a risk of sensitive information leakage. The disclosed information could include wireless network parameters or device configuration details, which attackers could leverage to gain deeper access or conduct further attacks such as network intrusion or lateral movement. While the vulnerability does not directly allow system compromise or denial of service, the confidentiality breach could undermine network security posture. In environments with strict data protection regulations like GDPR, unauthorized disclosure of network configuration or user data could lead to compliance issues and reputational damage. Additionally, since the attack vector is adjacent network, attackers would need to be within the local network or connected via Wi-Fi, which limits remote exploitation but does not eliminate risk in shared or poorly segmented networks.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement specific mitigations: 1) Replace or upgrade affected Linksys WRT54GL devices to newer models with supported firmware that addresses this vulnerability. 2) If replacement is not immediately feasible, restrict access to the router’s management interface by enabling network segmentation and isolating the device management VLAN or subnet. 3) Disable remote management features and restrict local network access to trusted devices only. 4) Monitor network traffic for unusual access attempts to /wlaninfo.htm or other management interface pages. 5) Employ strong Wi-Fi encryption (WPA3 or at least WPA2) and robust passwords to reduce the risk of unauthorized local network access. 6) Regularly audit and update router firmware when vendor updates become available, and consider third-party firmware alternatives if supported and secure. 7) Educate users about the risks of connecting untrusted devices to the local network to minimize insider threats.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2024-1405: CWE-200 Information Disclosure in Linksys WRT54GL
Description
A vulnerability was found in Linksys WRT54GL 4.30.18. It has been classified as problematic. This affects an unknown part of the file /wlaninfo.htm of the component Web Management Interface. The manipulation leads to information disclosure. The exploit has been disclosed to the public and may be used. The identifier VDB-253329 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2024-1405 is an information disclosure vulnerability identified in the Linksys WRT54GL router, specifically version 4.30.18. The vulnerability resides in the Web Management Interface component, within the /wlaninfo.htm file. An attacker can exploit this flaw to retrieve sensitive information from the device without requiring authentication or user interaction. The vulnerability is classified under CWE-200, indicating that it allows unauthorized disclosure of information that could aid further attacks or compromise user privacy. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is adjacent network (AV:A), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. The vendor, Linksys, has not responded to early disclosure attempts, and no patches or mitigations have been officially released. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. Given the widespread use of the WRT54GL model in home and small office environments, this vulnerability could expose network configuration details or other sensitive data to nearby attackers or compromised devices on the local network segment.
Potential Impact
For European organizations, especially small businesses and home offices relying on the Linksys WRT54GL router, this vulnerability poses a risk of sensitive information leakage. The disclosed information could include wireless network parameters or device configuration details, which attackers could leverage to gain deeper access or conduct further attacks such as network intrusion or lateral movement. While the vulnerability does not directly allow system compromise or denial of service, the confidentiality breach could undermine network security posture. In environments with strict data protection regulations like GDPR, unauthorized disclosure of network configuration or user data could lead to compliance issues and reputational damage. Additionally, since the attack vector is adjacent network, attackers would need to be within the local network or connected via Wi-Fi, which limits remote exploitation but does not eliminate risk in shared or poorly segmented networks.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement specific mitigations: 1) Replace or upgrade affected Linksys WRT54GL devices to newer models with supported firmware that addresses this vulnerability. 2) If replacement is not immediately feasible, restrict access to the router’s management interface by enabling network segmentation and isolating the device management VLAN or subnet. 3) Disable remote management features and restrict local network access to trusted devices only. 4) Monitor network traffic for unusual access attempts to /wlaninfo.htm or other management interface pages. 5) Employ strong Wi-Fi encryption (WPA3 or at least WPA2) and robust passwords to reduce the risk of unauthorized local network access. 6) Regularly audit and update router firmware when vendor updates become available, and consider third-party firmware alternatives if supported and secure. 7) Educate users about the risks of connecting untrusted devices to the local network to minimize insider threats.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-02-09T16:13:28.821Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec3c7
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 7:10:56 PM
Last updated: 7/31/2025, 8:51:29 AM
Views: 10
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.