Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39800: CWE-15: External Control of System or Configuration Setting in Wavlink Wavlink AC3000

0
Critical
VulnerabilityCVE-2024-39800cvecve-2024-39800cwe-15
Published: Tue Jan 14 2025 (01/14/2025, 14:21:02 UTC)
Source: CVE Database V5
Vendor/Project: Wavlink
Product: Wavlink AC3000

Description

Multiple external config control vulnerabilities exists in the openvpn.cgi openvpn_server_setup() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A configuration injection vulnerability exists in the `open_port` POST parameter.

AI-Powered Analysis

AILast updated: 11/03/2025, 22:24:59 UTC

Technical Analysis

CVE-2024-39800 is a critical security vulnerability identified in the Wavlink AC3000 router firmware version M33A8.V5030.210505. The flaw resides in the openvpn.cgi script, specifically within the openvpn_server_setup() function, which improperly handles external configuration input. The vulnerability is classified under CWE-15, indicating external control of system or configuration settings. An attacker with valid authentication credentials can craft malicious HTTP POST requests targeting the 'open_port' parameter, leading to configuration injection. This injection enables arbitrary command execution on the underlying system, effectively allowing the attacker to execute commands with the privileges of the router's web service. The vulnerability has a CVSS 3.1 base score of 9.1, reflecting its critical nature, with attack vector network (AV:N), low attack complexity (AC:L), requiring privileges (PR:H), no user interaction (UI:N), and scope changed (S:C). The impact includes full compromise of confidentiality, integrity, and availability of the device and potentially the network it serves. Although no exploits are currently known in the wild, the vulnerability’s characteristics make it a high-risk target for attackers. The lack of available patches at the time of publication increases the urgency for mitigation. The vulnerability could be leveraged to disrupt network services, intercept or manipulate data, or pivot into internal networks, posing significant risks to affected organizations.

Potential Impact

For European organizations, the impact of CVE-2024-39800 can be severe. Wavlink AC3000 routers are commonly used in small to medium enterprises and some home office environments across Europe. Successful exploitation could lead to full device compromise, allowing attackers to intercept sensitive communications, disrupt network availability, or use the compromised router as a foothold for lateral movement within corporate networks. This could result in data breaches, operational downtime, and loss of trust. Critical infrastructure or organizations with remote VPN access relying on these routers are particularly at risk. The vulnerability’s requirement for authentication limits exposure to some extent but does not eliminate risk, especially if credentials are weak, reused, or obtained via phishing or other means. Given the criticality of network infrastructure in European regulatory environments such as GDPR and NIS Directive, exploitation could also lead to regulatory penalties and reputational damage.

Mitigation Recommendations

1. Immediately identify and inventory all Wavlink AC3000 devices running the affected firmware version M33A8.V5030.210505 within the organization. 2. Restrict administrative access to the router’s web interface to trusted networks and use strong, unique credentials to prevent unauthorized authentication. 3. Disable the OpenVPN server functionality if not required, reducing the attack surface. 4. Monitor network traffic and router logs for unusual POST requests targeting openvpn.cgi or unexpected configuration changes. 5. Implement network segmentation to isolate critical systems from devices running vulnerable firmware. 6. Regularly check for firmware updates or security advisories from Wavlink and apply patches as soon as they become available. 7. Consider deploying Web Application Firewalls (WAF) or Intrusion Detection/Prevention Systems (IDS/IPS) with signatures to detect and block exploitation attempts. 8. Educate network administrators on the risks of this vulnerability and enforce strict credential management policies. 9. If patching is delayed, consider temporary mitigations such as disabling remote management or VPN server features until a fix is applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2024-06-28T18:05:54.343Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690929affe7723195e0fd803

Added to database: 11/3/2025, 10:16:15 PM

Last enriched: 11/3/2025, 10:24:59 PM

Last updated: 11/4/2025, 12:04:06 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats