Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-27571: n/a

0
High
VulnerabilityCVE-2024-27571cvecve-2024-27571
Published: Fri Mar 01 2024 (03/01/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

LBT T300-T390 v2.2.1.8 were discovered to contain a stack overflow via the ApCliSsid parameter in the makeCurRemoteApList function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 11:07:18 UTC

Technical Analysis

CVE-2024-27571 is a stack-based buffer overflow vulnerability identified in LBT T300-T390 series devices running firmware version 2.2.1.8. The vulnerability resides in the makeCurRemoteApList function, specifically through improper handling of the ApCliSsid parameter. When processing this parameter in a crafted POST request, the device fails to properly validate input length or bounds, leading to a stack overflow condition. This overflow can overwrite the stack memory, causing the device to crash or reboot unexpectedly, resulting in a Denial of Service (DoS). The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. While no known public exploits have been reported, the ease of exploitation and the direct impact on device availability make this a critical concern for network stability. The vulnerability is tracked under CWE-121 (Stack-based Buffer Overflow) and has been assigned a CVSS v3.1 base score of 7.5, reflecting its high impact on availability with no confidentiality or integrity loss. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts by affected organizations.

Potential Impact

The primary impact of CVE-2024-27571 is a Denial of Service condition on affected LBT T300-T390 devices. This can disrupt network connectivity and availability, particularly in environments relying on these devices for wireless access or network bridging. Organizations may experience service outages, degraded network performance, and potential operational downtime. Since the vulnerability can be triggered remotely without authentication, attackers can easily target exposed devices, increasing the risk of widespread disruption. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can affect critical business functions, especially in sectors dependent on continuous network access such as telecommunications, enterprise networks, and public infrastructure. The absence of known exploits currently limits immediate widespread impact, but the vulnerability remains a significant risk if weaponized.

Mitigation Recommendations

To mitigate CVE-2024-27571, organizations should first check for any firmware updates or patches released by LBT addressing this vulnerability and apply them promptly. In the absence of official patches, network administrators should restrict access to the management interfaces of affected devices by implementing network segmentation and firewall rules to block unauthorized POST requests targeting the vulnerable endpoint. Deploying intrusion detection or prevention systems (IDS/IPS) with custom signatures to detect anomalous POST requests containing malformed ApCliSsid parameters can help identify and block exploitation attempts. Additionally, disabling remote management features or restricting them to trusted IP addresses reduces exposure. Regular monitoring of device logs for crashes or unusual reboots can provide early warning signs of exploitation attempts. Finally, organizations should consider replacing vulnerable devices with updated models if patches are unavailable or delayed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d80b7ef31ef0b57dd90

Added to database: 2/25/2026, 9:45:36 PM

Last enriched: 2/26/2026, 11:07:18 AM

Last updated: 4/12/2026, 7:55:36 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses