Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39765: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Wavlink Wavlink AC3000

0
Critical
VulnerabilityCVE-2024-39765cvecve-2024-39765cwe-77
Published: Tue Jan 14 2025 (01/14/2025, 14:21:34 UTC)
Source: CVE Database V5
Vendor/Project: Wavlink
Product: Wavlink AC3000

Description

Multiple OS command injection vulnerabilities exist in the internet.cgi set_add_routing() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `custom_interface` POST parameter.

AI-Powered Analysis

AILast updated: 11/03/2025, 23:07:35 UTC

Technical Analysis

CVE-2024-39765 is a critical OS command injection vulnerability identified in the Wavlink AC3000 router firmware version M33A8.V5030.210505. The flaw resides in the internet.cgi script’s set_add_routing() function, where improper neutralization of special elements in the custom_interface POST parameter allows an authenticated attacker to inject arbitrary OS commands. This vulnerability is classified under CWE-77, indicating improper sanitization of input leading to command injection. Exploitation requires the attacker to be authenticated to the device’s web management interface but does not require user interaction beyond that. The vulnerability enables execution of arbitrary commands with the privileges of the web server process, potentially leading to full device compromise, including control over routing, interception or modification of network traffic, and denial of service. The CVSS v3.1 score of 9.1 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) reflects a network attack vector with low complexity, requiring high privileges (authenticated access), no user interaction, and complete impact on confidentiality, integrity, and availability with scope change. No patches or public exploits are currently available, but the critical nature of this vulnerability necessitates urgent mitigation. The vulnerability’s presence in a widely deployed router model used in enterprise and consumer environments raises concerns about potential lateral movement and persistent footholds within affected networks.

Potential Impact

For European organizations, exploitation of CVE-2024-39765 could lead to severe consequences including unauthorized control over network routing, interception of sensitive communications, and disruption of internet connectivity. Compromise of the Wavlink AC3000 routers could allow attackers to pivot into internal networks, exfiltrate confidential data, or launch further attacks against critical infrastructure. The vulnerability’s ability to affect confidentiality, integrity, and availability simultaneously makes it particularly dangerous for sectors such as finance, healthcare, government, and telecommunications. Given the router’s role as a network gateway, successful exploitation could undermine trust in network security and cause operational downtime. Additionally, the lack of public exploits currently means organizations may be caught unprepared if threat actors develop weaponized payloads. The requirement for authenticated access somewhat limits remote exploitation but does not eliminate risk, especially in environments with weak or default credentials or exposed management interfaces.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the router’s web management interface to trusted internal networks and enforcing strong authentication policies to prevent unauthorized access. Network segmentation should be implemented to isolate management interfaces from general user traffic. Organizations should monitor network traffic for unusual HTTP requests targeting the internet.cgi endpoint and the set_add_routing() function. Since no official patches are currently available, consider replacing affected devices with updated models or alternative vendors that have addressed this vulnerability. Employing Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom rules to detect and block command injection patterns in HTTP POST requests can provide additional protection. Regularly audit router configurations and credentials to ensure no default or weak passwords are in use. Finally, maintain vigilance for vendor updates or security advisories that provide patches or further guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2024-06-28T16:07:49.001Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690929aafe7723195e0fd68a

Added to database: 11/3/2025, 10:16:10 PM

Last enriched: 11/3/2025, 11:07:35 PM

Last updated: 11/5/2025, 1:54:44 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats