Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39781: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Wavlink Wavlink AC3000

0
Critical
VulnerabilityCVE-2024-39781cvecve-2024-39781cwe-77
Published: Tue Jan 14 2025 (01/14/2025, 14:21:25 UTC)
Source: CVE Database V5
Vendor/Project: Wavlink
Product: Wavlink AC3000

Description

Multiple OS command injection vulnerabilities exist in the adm.cgi sch_reboot() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to a arbitrary code execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `restart_hour` POST parameter.

AI-Powered Analysis

AILast updated: 11/03/2025, 22:29:43 UTC

Technical Analysis

CVE-2024-39781 is a critical command injection vulnerability identified in the Wavlink AC3000 router, firmware version M33A8.V5030.210505. The flaw resides in the adm.cgi script's sch_reboot() function, specifically in the handling of the restart_hour POST parameter. Improper neutralization of special elements (CWE-77) allows an authenticated attacker to inject arbitrary OS commands via a specially crafted HTTP request. This vulnerability enables the attacker to execute commands with the privileges of the web server process, potentially leading to full system compromise including unauthorized access, data exfiltration, or disruption of network services. The CVSS 3.1 base score of 9.1 indicates a critical severity with network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H) but no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits have been reported yet, but the vulnerability’s nature and ease of exploitation make it a high-risk issue. The affected product is primarily used as a wireless router in home and small office environments, but may also be deployed in enterprise edge networks. The vulnerability’s exploitation requires authentication, which somewhat limits remote exploitation but still poses a significant threat if credentials are compromised or weak. The lack of available patches at the time of publication necessitates immediate risk mitigation strategies.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to severe consequences including unauthorized control over network infrastructure, interception or manipulation of sensitive data, and disruption of critical network services. Given the critical CVSS score and the ability to execute arbitrary commands, attackers could pivot from compromised routers to internal networks, escalating attacks on corporate or governmental systems. This is particularly concerning for sectors such as finance, healthcare, and critical infrastructure where network reliability and data confidentiality are paramount. The requirement for authentication reduces the risk from purely external attackers but elevates the threat from insider attackers or those who have obtained valid credentials through phishing or other means. The widespread use of Wavlink devices in European small and medium enterprises and some public sector deployments increases the attack surface. Additionally, the vulnerability could be leveraged in botnet formation or as a foothold for ransomware campaigns targeting European networks.

Mitigation Recommendations

Immediate mitigation should focus on restricting access to the router’s administrative interface to trusted networks and users only, employing strong, unique authentication credentials, and monitoring for suspicious administrative activity. Network segmentation should be enforced to isolate vulnerable devices from critical assets. Since no official patches are currently available, organizations should contact Wavlink support for firmware updates or advisories. If possible, disable the sch_reboot() functionality or any web management features that accept POST requests until a patch is applied. Employ network-level protections such as web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) to detect and block malicious HTTP requests targeting the vulnerable parameter. Regularly audit router firmware versions and configurations across the organization’s network. Educate users and administrators about the risks of credential compromise and enforce multi-factor authentication (MFA) where supported. Finally, maintain up-to-date backups and incident response plans to minimize impact in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2024-06-28T16:07:58.453Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690929acfe7723195e0fd6d5

Added to database: 11/3/2025, 10:16:12 PM

Last enriched: 11/3/2025, 10:29:43 PM

Last updated: 11/5/2025, 2:09:48 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats