Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39759: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Wavlink Wavlink AC3000

0
Critical
VulnerabilityCVE-2024-39759cvecve-2024-39759cwe-77
Published: Tue Jan 14 2025 (01/14/2025, 14:21:35 UTC)
Source: CVE Database V5
Vendor/Project: Wavlink
Product: Wavlink AC3000

Description

Multiple OS command injection vulnerabilities exist in the login.cgi set_sys_init() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an unauthenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists within the `restart_hour_value` POST parameter.

AI-Powered Analysis

AILast updated: 11/03/2025, 23:05:45 UTC

Technical Analysis

CVE-2024-39759 is an OS command injection vulnerability identified in the Wavlink AC3000 router firmware version M33A8.V5030.210505. The flaw resides in the login.cgi script, specifically within the set_sys_init() function that processes the restart_hour_value POST parameter. This parameter is improperly sanitized, allowing an attacker to inject arbitrary OS commands. Because the vulnerable endpoint does not require authentication, any remote attacker can exploit this by sending a crafted HTTP request to the device’s web interface. Successful exploitation results in arbitrary code execution with the privileges of the web server process, which on embedded devices like routers often equates to root-level control. This can lead to full device compromise, enabling attackers to alter configurations, intercept or redirect traffic, deploy persistent malware, or launch further attacks within the network. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), highlighting the failure to properly sanitize input before command execution. The CVSS v3.1 base score is 10.0, reflecting the vulnerability’s criticality due to network attack vector, no required privileges, no user interaction, and complete impact on confidentiality, integrity, and availability. No patches or public exploits are currently reported, but the severity and ease of exploitation make this a high-risk issue for affected users.

Potential Impact

For European organizations, the impact of CVE-2024-39759 can be severe. Compromise of Wavlink AC3000 routers could lead to unauthorized access to internal networks, interception of sensitive data, disruption of internet connectivity, and potential lateral movement to other critical systems. This is particularly concerning for enterprises, government agencies, and critical infrastructure operators relying on these devices for secure network access. The ability to execute arbitrary commands remotely without authentication means attackers can deploy persistent backdoors or use the compromised routers as launchpads for broader attacks such as ransomware or espionage. The disruption of availability could affect business continuity and critical services. Additionally, the breach of confidentiality and integrity could result in data leaks or manipulation, undermining trust and compliance with regulations such as GDPR. Given the widespread use of consumer and SMB networking equipment in European homes and offices, the vulnerability poses a broad risk across multiple sectors.

Mitigation Recommendations

1. Immediate network-level mitigation: Block access to the router’s web management interface from untrusted networks, especially the internet, using firewall rules or network segmentation. 2. Disable remote management interfaces if not required to reduce exposure. 3. Monitor network traffic for unusual HTTP requests targeting login.cgi or suspicious command injection patterns. 4. Replace or upgrade affected devices to firmware versions that address this vulnerability once available from Wavlink. Since no patches are currently released, contact Wavlink support for timelines or interim fixes. 5. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures to detect attempts to exploit command injection. 6. Conduct regular audits of router configurations and logs to identify signs of compromise. 7. Educate network administrators about this vulnerability and ensure strict access controls on management interfaces. 8. Consider deploying alternative, more secure networking hardware if timely patching is not feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2024-06-28T16:07:48.108Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690929aafe7723195e0fd672

Added to database: 11/3/2025, 10:16:10 PM

Last enriched: 11/3/2025, 11:05:45 PM

Last updated: 11/5/2025, 3:07:58 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats