CVE-2024-31151: CWE-798: Use of Hard-coded Credentials in LevelOne WBR-6012
A security flaw involving hard-coded credentials in LevelOne WBR-6012's web services allows attackers to gain unauthorized access during the first 30 seconds post-boot. Other vulnerabilities can force a reboot, circumventing the initial time restriction for exploitation.The password string can be found at addresses 0x 803cdd0f and 0x803da3e6: 803cdd0f 41 72 69 65 ds "AriesSerenaCairryNativitaMegan" 73 53 65 72 65 6e 61 43 ... It is referenced by the function at 0x800b78b0 and simplified in the pseudocode below: if (is_equal = strcmp(password,"AriesSerenaCairryNativitaMegan"){ ret = 3;} Where 3 is the return value to user-level access (0 being fail and 1 being admin/backdoor). While there's no legitimate functionality to change this password, once authenticated it is possible manually make a change by taking advantage of TALOS-2024-XXXXX using HTTP POST paramater "Pu" (new user password) in place of "Pa" (new admin password).
AI Analysis
Technical Summary
CVE-2024-31151 identifies a critical security flaw in the LevelOne WBR-6012 router, specifically firmware version R0.40e6. The vulnerability stems from the presence of a hard-coded password embedded directly in the device's web services binary at memory addresses 0x803cdd0f and 0x803da3e6. The password string "AriesSerenaCairryNativitaMegan" is used by the authentication function to grant user-level access immediately after device boot, within a 30-second window. This time-limited access is intended to restrict exploitation; however, other vulnerabilities allow attackers to force device reboots, effectively resetting the timer and enabling repeated unauthorized access. The authentication function returns a value of 3 upon successful password match, granting user-level privileges, while 0 indicates failure and 1 indicates admin or backdoor access. Although the hard-coded password cannot be changed through normal means, attackers who gain access can exploit an additional vulnerability (TALOS-2024-XXXXX) to change user passwords by sending specially crafted HTTP POST requests with the "Pu" parameter. The vulnerability is remotely exploitable without prior authentication or user interaction, and the CVSS 3.1 base score of 8.1 reflects its high impact on confidentiality, integrity, and availability. No official patches are currently available, increasing the urgency for mitigation. The flaw exposes devices to unauthorized control, potential data leakage, and service disruption, especially in environments where these routers are deployed in critical network segments.
Potential Impact
For European organizations, this vulnerability poses significant risks including unauthorized access to network devices, potential interception or manipulation of network traffic, and disruption of network services. Compromise of the WBR-6012 routers could allow attackers to pivot into internal networks, exfiltrate sensitive data, or launch further attacks such as man-in-the-middle or denial-of-service. The ability to force reboots to bypass the initial time restriction increases the attack surface and persistence potential. Organizations relying on these routers in critical infrastructure, small to medium enterprises, or branch offices may face operational disruptions and data breaches. The lack of available patches means that affected entities must rely on compensating controls, increasing operational complexity and risk. Additionally, the exposure of hard-coded credentials undermines trust in device security and may lead to regulatory compliance issues under GDPR if personal data is compromised.
Mitigation Recommendations
Immediate mitigation should focus on network-level controls: isolate affected WBR-6012 devices from untrusted networks and restrict management access to trusted administrators only. Implement strict firewall rules to block external access to router web services. Monitor network traffic for unusual reboot patterns that may indicate exploitation attempts. Disable remote management features if not required. Where possible, replace affected devices with models from vendors that do not have hard-coded credentials. If replacement is not feasible, consider deploying network segmentation and intrusion detection systems to detect and contain exploitation attempts. Since no official patches are available, coordinate with LevelOne for firmware updates or advisories. Additionally, conduct regular audits of device configurations and credentials, and educate staff about the risks of using devices with known hard-coded credentials. Finally, prepare incident response plans specific to router compromise scenarios to minimize impact if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2024-31151: CWE-798: Use of Hard-coded Credentials in LevelOne WBR-6012
Description
A security flaw involving hard-coded credentials in LevelOne WBR-6012's web services allows attackers to gain unauthorized access during the first 30 seconds post-boot. Other vulnerabilities can force a reboot, circumventing the initial time restriction for exploitation.The password string can be found at addresses 0x 803cdd0f and 0x803da3e6: 803cdd0f 41 72 69 65 ds "AriesSerenaCairryNativitaMegan" 73 53 65 72 65 6e 61 43 ... It is referenced by the function at 0x800b78b0 and simplified in the pseudocode below: if (is_equal = strcmp(password,"AriesSerenaCairryNativitaMegan"){ ret = 3;} Where 3 is the return value to user-level access (0 being fail and 1 being admin/backdoor). While there's no legitimate functionality to change this password, once authenticated it is possible manually make a change by taking advantage of TALOS-2024-XXXXX using HTTP POST paramater "Pu" (new user password) in place of "Pa" (new admin password).
AI-Powered Analysis
Technical Analysis
CVE-2024-31151 identifies a critical security flaw in the LevelOne WBR-6012 router, specifically firmware version R0.40e6. The vulnerability stems from the presence of a hard-coded password embedded directly in the device's web services binary at memory addresses 0x803cdd0f and 0x803da3e6. The password string "AriesSerenaCairryNativitaMegan" is used by the authentication function to grant user-level access immediately after device boot, within a 30-second window. This time-limited access is intended to restrict exploitation; however, other vulnerabilities allow attackers to force device reboots, effectively resetting the timer and enabling repeated unauthorized access. The authentication function returns a value of 3 upon successful password match, granting user-level privileges, while 0 indicates failure and 1 indicates admin or backdoor access. Although the hard-coded password cannot be changed through normal means, attackers who gain access can exploit an additional vulnerability (TALOS-2024-XXXXX) to change user passwords by sending specially crafted HTTP POST requests with the "Pu" parameter. The vulnerability is remotely exploitable without prior authentication or user interaction, and the CVSS 3.1 base score of 8.1 reflects its high impact on confidentiality, integrity, and availability. No official patches are currently available, increasing the urgency for mitigation. The flaw exposes devices to unauthorized control, potential data leakage, and service disruption, especially in environments where these routers are deployed in critical network segments.
Potential Impact
For European organizations, this vulnerability poses significant risks including unauthorized access to network devices, potential interception or manipulation of network traffic, and disruption of network services. Compromise of the WBR-6012 routers could allow attackers to pivot into internal networks, exfiltrate sensitive data, or launch further attacks such as man-in-the-middle or denial-of-service. The ability to force reboots to bypass the initial time restriction increases the attack surface and persistence potential. Organizations relying on these routers in critical infrastructure, small to medium enterprises, or branch offices may face operational disruptions and data breaches. The lack of available patches means that affected entities must rely on compensating controls, increasing operational complexity and risk. Additionally, the exposure of hard-coded credentials undermines trust in device security and may lead to regulatory compliance issues under GDPR if personal data is compromised.
Mitigation Recommendations
Immediate mitigation should focus on network-level controls: isolate affected WBR-6012 devices from untrusted networks and restrict management access to trusted administrators only. Implement strict firewall rules to block external access to router web services. Monitor network traffic for unusual reboot patterns that may indicate exploitation attempts. Disable remote management features if not required. Where possible, replace affected devices with models from vendors that do not have hard-coded credentials. If replacement is not feasible, consider deploying network segmentation and intrusion detection systems to detect and contain exploitation attempts. Since no official patches are available, coordinate with LevelOne for firmware updates or advisories. Additionally, conduct regular audits of device configurations and credentials, and educate staff about the risks of using devices with known hard-coded credentials. Finally, prepare incident response plans specific to router compromise scenarios to minimize impact if exploitation occurs.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2024-04-30T21:32:15.720Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69092623fe7723195e0b472f
Added to database: 11/3/2025, 10:01:07 PM
Last enriched: 11/3/2025, 11:59:24 PM
Last updated: 12/15/2025, 8:03:39 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14710: SQL Injection in FantasticLBP Hotels Server
MediumCVE-2025-14709: Buffer Overflow in Shiguangwu sgwbox N3
CriticalCVE-2025-14023: na in LINE Corporation LINE client for iOS
LowCVE-2025-14022: na in LINE Corporation LINE client for iOS
HighCVE-2025-14021: na in LINE Corporation LINE client for iOS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.