Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-27567: n/a

0
Medium
VulnerabilityCVE-2024-27567cvecve-2024-27567
Published: Fri Mar 01 2024 (03/01/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

LBT T300- T390 v2.2.1.8 were discovered to contain a stack overflow via the vpn_client_ip parameter in the config_vpn_pptp function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 11:06:37 UTC

Technical Analysis

CVE-2024-27567 is a stack-based buffer overflow vulnerability identified in LBT T300-T390 series devices running firmware version 2.2.1.8. The vulnerability resides in the config_vpn_pptp function, which processes the vpn_client_ip parameter. When a specially crafted POST request is sent to the device targeting this parameter, it causes a stack overflow condition. This overflow can disrupt normal execution flow, leading to a Denial of Service (DoS) by crashing the VPN service or the entire device. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). Exploitation does not require authentication privileges but does require the attacker to send a crafted POST request, implying some level of user interaction or network access. The CVSS v3.1 base score is 6.5, indicating a medium severity impact primarily on availability (A:H), with no impact on confidentiality or integrity. No known exploits have been reported in the wild, and no official patches or mitigations have been released at the time of publication. This vulnerability could be leveraged by attackers to disrupt VPN connectivity, potentially impacting remote access capabilities for organizations relying on these devices.

Potential Impact

The primary impact of CVE-2024-27567 is the disruption of VPN services through a Denial of Service attack, which can prevent legitimate users from establishing or maintaining VPN connections. This can severely affect organizations that depend on these LBT devices for secure remote access, potentially halting business operations or remote workforce productivity. Although the vulnerability does not expose sensitive data or allow unauthorized access, the loss of availability can lead to operational downtime and increased support costs. In critical infrastructure or high-security environments, such service interruptions could have cascading effects on business continuity and incident response capabilities. Since exploitation requires sending a crafted POST request, attackers with network access to the device’s management or VPN interface could trigger the DoS. The absence of known exploits and patches currently limits immediate risk, but the medium severity score and ease of triggering the vulnerability warrant proactive mitigation.

Mitigation Recommendations

To mitigate CVE-2024-27567, organizations should first restrict network access to the VPN management interfaces, limiting exposure to trusted IP addresses or VPN users only. Implement network segmentation and firewall rules to prevent unauthorized external access to the vulnerable devices. Monitor network traffic for unusual POST requests targeting the vpn_client_ip parameter or abnormal VPN service crashes. Since no official patches are available, coordinate with the vendor for firmware updates or advisories addressing this vulnerability. Consider deploying intrusion detection or prevention systems (IDS/IPS) with custom signatures to detect exploitation attempts. As a temporary workaround, disabling PPTP VPN functionality if not required can reduce attack surface. Regularly review device logs and conduct vulnerability scans to identify affected devices and verify mitigation effectiveness. Finally, maintain an incident response plan to quickly address potential DoS incidents impacting VPN availability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d80b7ef31ef0b57dd77

Added to database: 2/25/2026, 9:45:36 PM

Last enriched: 2/26/2026, 11:06:37 AM

Last updated: 4/11/2026, 6:10:55 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses