Skip to main content

CVE-2024-1405: CWE-200 Information Disclosure in Linksys WRT54GL

Medium
VulnerabilityCVE-2024-1405cvecve-2024-1405cwe-200
Published: Sat Feb 10 2024 (02/10/2024, 05:31:03 UTC)
Source: CVE
Vendor/Project: Linksys
Product: WRT54GL

Description

A vulnerability was found in Linksys WRT54GL 4.30.18. It has been classified as problematic. This affects an unknown part of the file /wlaninfo.htm of the component Web Management Interface. The manipulation leads to information disclosure. The exploit has been disclosed to the public and may be used. The identifier VDB-253329 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/04/2025, 19:10:56 UTC

Technical Analysis

CVE-2024-1405 is an information disclosure vulnerability identified in the Linksys WRT54GL router, specifically version 4.30.18. The vulnerability resides in the Web Management Interface component, within the /wlaninfo.htm file. An attacker can exploit this flaw to retrieve sensitive information from the device without requiring authentication or user interaction. The vulnerability is classified under CWE-200, indicating that it allows unauthorized disclosure of information that could aid further attacks or compromise user privacy. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is adjacent network (AV:A), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. The vendor, Linksys, has not responded to early disclosure attempts, and no patches or mitigations have been officially released. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. Given the widespread use of the WRT54GL model in home and small office environments, this vulnerability could expose network configuration details or other sensitive data to nearby attackers or compromised devices on the local network segment.

Potential Impact

For European organizations, especially small businesses and home offices relying on the Linksys WRT54GL router, this vulnerability poses a risk of sensitive information leakage. The disclosed information could include wireless network parameters or device configuration details, which attackers could leverage to gain deeper access or conduct further attacks such as network intrusion or lateral movement. While the vulnerability does not directly allow system compromise or denial of service, the confidentiality breach could undermine network security posture. In environments with strict data protection regulations like GDPR, unauthorized disclosure of network configuration or user data could lead to compliance issues and reputational damage. Additionally, since the attack vector is adjacent network, attackers would need to be within the local network or connected via Wi-Fi, which limits remote exploitation but does not eliminate risk in shared or poorly segmented networks.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement specific mitigations: 1) Replace or upgrade affected Linksys WRT54GL devices to newer models with supported firmware that addresses this vulnerability. 2) If replacement is not immediately feasible, restrict access to the router’s management interface by enabling network segmentation and isolating the device management VLAN or subnet. 3) Disable remote management features and restrict local network access to trusted devices only. 4) Monitor network traffic for unusual access attempts to /wlaninfo.htm or other management interface pages. 5) Employ strong Wi-Fi encryption (WPA3 or at least WPA2) and robust passwords to reduce the risk of unauthorized local network access. 6) Regularly audit and update router firmware when vendor updates become available, and consider third-party firmware alternatives if supported and secure. 7) Educate users about the risks of connecting untrusted devices to the local network to minimize insider threats.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-02-09T16:13:28.821Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec3c7

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:10:56 PM

Last updated: 7/31/2025, 8:51:29 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats