Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39790: CWE-15: External Control of System or Configuration Setting in Wavlink Wavlink AC3000

0
Critical
VulnerabilityCVE-2024-39790cvecve-2024-39790cwe-15
Published: Tue Jan 14 2025 (01/14/2025, 14:20:58 UTC)
Source: CVE Database V5
Vendor/Project: Wavlink
Product: Wavlink AC3000

Description

Multiple external config control vulnerabilities exist in the nas.cgi set_ftp_cfg() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to permission bypass. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists within the `ftp_max_sessions` POST parameter.

AI-Powered Analysis

AILast updated: 11/03/2025, 22:27:09 UTC

Technical Analysis

CVE-2024-39790 is a critical security vulnerability identified in the Wavlink AC3000 router firmware version M33A8.V5030.210505. The flaw resides in the nas.cgi set_ftp_cfg() functionality, specifically within the handling of the ftp_max_sessions POST parameter. This vulnerability falls under CWE-15, which involves external control of system or configuration settings. An attacker with valid authentication credentials can send specially crafted HTTP requests to the nas.cgi endpoint to manipulate FTP configuration parameters, bypassing permission checks. This configuration injection can lead to unauthorized changes in system settings, potentially allowing the attacker to escalate privileges, disrupt services, or exfiltrate sensitive data. The vulnerability has a CVSS v3.1 score of 9.1, reflecting its critical nature due to network attack vector (AV:N), low attack complexity (AC:L), requirement for high privileges (PR:H), no user interaction (UI:N), and impact on confidentiality, integrity, and availability (all high). Although no public exploits are currently known, the vulnerability's characteristics make it a significant risk, especially in environments where Wavlink AC3000 routers are deployed. The lack of available patches at the time of reporting increases the urgency for interim mitigations. The vulnerability highlights the risks associated with insufficient validation and authorization controls in router configuration interfaces, which are common targets for attackers aiming to compromise network infrastructure.

Potential Impact

For European organizations, exploitation of CVE-2024-39790 could lead to severe consequences including unauthorized configuration changes, disruption of FTP services, potential network compromise, and data breaches. Given the criticality of the vulnerability, attackers could leverage it to gain persistent access or disrupt business operations. Organizations relying on Wavlink AC3000 routers for critical network functions or in sensitive sectors such as finance, healthcare, or government could face significant operational and reputational damage. The vulnerability’s ability to impact confidentiality, integrity, and availability simultaneously makes it particularly dangerous. Additionally, the requirement for authentication means insider threats or compromised credentials could facilitate exploitation. The absence of patches necessitates immediate risk management to prevent exploitation, especially in environments with remote administrative access enabled. The impact is magnified in distributed networks where compromised routers can serve as footholds for lateral movement or as launch points for broader attacks.

Mitigation Recommendations

1. Immediately restrict administrative access to the Wavlink AC3000 router management interface by limiting it to trusted IP addresses and using VPNs for remote access. 2. Enforce strong authentication mechanisms and rotate credentials regularly to reduce the risk of credential compromise. 3. Monitor router logs and network traffic for unusual FTP configuration changes or unauthorized HTTP requests to the nas.cgi endpoint. 4. Disable FTP services if not required or limit FTP session parameters manually to safe values. 5. Segment networks to isolate critical infrastructure from devices running vulnerable firmware. 6. Engage with Wavlink support channels to obtain firmware updates or patches as soon as they become available. 7. Consider deploying network-based intrusion detection/prevention systems (IDS/IPS) with signatures targeting exploitation attempts of this vulnerability. 8. Conduct regular security assessments and penetration tests focusing on router configurations and access controls. 9. Educate network administrators about the risks of configuration injection vulnerabilities and the importance of secure router management practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2024-06-28T18:05:47.926Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690929affe7723195e0fd7eb

Added to database: 11/3/2025, 10:16:15 PM

Last enriched: 11/3/2025, 10:27:09 PM

Last updated: 11/5/2025, 3:51:08 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats