Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31151: CWE-798: Use of Hard-coded Credentials in LevelOne WBR-6012

0
High
VulnerabilityCVE-2024-31151cvecve-2024-31151cwe-798
Published: Wed Oct 30 2024 (10/30/2024, 13:35:20 UTC)
Source: CVE Database V5
Vendor/Project: LevelOne
Product: WBR-6012

Description

A security flaw involving hard-coded credentials in LevelOne WBR-6012's web services allows attackers to gain unauthorized access during the first 30 seconds post-boot. Other vulnerabilities can force a reboot, circumventing the initial time restriction for exploitation.The password string can be found at addresses 0x 803cdd0f and 0x803da3e6: 803cdd0f 41 72 69 65 ds "AriesSerenaCairryNativitaMegan" 73 53 65 72 65 6e 61 43 ... It is referenced by the function at 0x800b78b0 and simplified in the pseudocode below: if (is_equal = strcmp(password,"AriesSerenaCairryNativitaMegan"){ ret = 3;} Where 3 is the return value to user-level access (0 being fail and 1 being admin/backdoor). While there's no legitimate functionality to change this password, once authenticated it is possible manually make a change by taking advantage of TALOS-2024-XXXXX using HTTP POST paramater "Pu" (new user password) in place of "Pa" (new admin password).

AI-Powered Analysis

AILast updated: 11/03/2025, 23:59:24 UTC

Technical Analysis

CVE-2024-31151 identifies a critical security flaw in the LevelOne WBR-6012 router, specifically firmware version R0.40e6. The vulnerability stems from the presence of a hard-coded password embedded directly in the device's web services binary at memory addresses 0x803cdd0f and 0x803da3e6. The password string "AriesSerenaCairryNativitaMegan" is used by the authentication function to grant user-level access immediately after device boot, within a 30-second window. This time-limited access is intended to restrict exploitation; however, other vulnerabilities allow attackers to force device reboots, effectively resetting the timer and enabling repeated unauthorized access. The authentication function returns a value of 3 upon successful password match, granting user-level privileges, while 0 indicates failure and 1 indicates admin or backdoor access. Although the hard-coded password cannot be changed through normal means, attackers who gain access can exploit an additional vulnerability (TALOS-2024-XXXXX) to change user passwords by sending specially crafted HTTP POST requests with the "Pu" parameter. The vulnerability is remotely exploitable without prior authentication or user interaction, and the CVSS 3.1 base score of 8.1 reflects its high impact on confidentiality, integrity, and availability. No official patches are currently available, increasing the urgency for mitigation. The flaw exposes devices to unauthorized control, potential data leakage, and service disruption, especially in environments where these routers are deployed in critical network segments.

Potential Impact

For European organizations, this vulnerability poses significant risks including unauthorized access to network devices, potential interception or manipulation of network traffic, and disruption of network services. Compromise of the WBR-6012 routers could allow attackers to pivot into internal networks, exfiltrate sensitive data, or launch further attacks such as man-in-the-middle or denial-of-service. The ability to force reboots to bypass the initial time restriction increases the attack surface and persistence potential. Organizations relying on these routers in critical infrastructure, small to medium enterprises, or branch offices may face operational disruptions and data breaches. The lack of available patches means that affected entities must rely on compensating controls, increasing operational complexity and risk. Additionally, the exposure of hard-coded credentials undermines trust in device security and may lead to regulatory compliance issues under GDPR if personal data is compromised.

Mitigation Recommendations

Immediate mitigation should focus on network-level controls: isolate affected WBR-6012 devices from untrusted networks and restrict management access to trusted administrators only. Implement strict firewall rules to block external access to router web services. Monitor network traffic for unusual reboot patterns that may indicate exploitation attempts. Disable remote management features if not required. Where possible, replace affected devices with models from vendors that do not have hard-coded credentials. If replacement is not feasible, consider deploying network segmentation and intrusion detection systems to detect and contain exploitation attempts. Since no official patches are available, coordinate with LevelOne for firmware updates or advisories. Additionally, conduct regular audits of device configurations and credentials, and educate staff about the risks of using devices with known hard-coded credentials. Finally, prepare incident response plans specific to router compromise scenarios to minimize impact if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2024-04-30T21:32:15.720Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092623fe7723195e0b472f

Added to database: 11/3/2025, 10:01:07 PM

Last enriched: 11/3/2025, 11:59:24 PM

Last updated: 12/20/2025, 5:14:01 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats