CVE-2024-39802: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Wavlink Wavlink AC3000
Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `qos_dat` POST parameter.
AI Analysis
Technical Summary
CVE-2024-39802 is a classic stack-based buffer overflow vulnerability identified in the Wavlink AC3000 router firmware version M33A8.V5030.210505. The flaw resides in the qos.cgi script, specifically within the qos_settings() function that processes the qos_dat POST parameter. This parameter is not properly bounds-checked before being copied to a fixed-size buffer, allowing an attacker with authenticated HTTP access to send a specially crafted request that overflows the stack buffer. This overflow can overwrite the return address or other control data, enabling arbitrary code execution with elevated privileges on the device. The vulnerability is categorized under CWE-120 (Buffer Copy without Checking Size of Input), a well-known and dangerous class of memory corruption bugs. The CVSS v3.1 score of 9.1 reflects the vulnerability's critical nature, with network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), and complete impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported, the potential for exploitation is significant given the router’s role in network traffic management and the possibility of persistent device compromise. The vulnerability affects a specific firmware version, emphasizing the importance of firmware management and updates. The lack of available patches at the time of disclosure increases the urgency for interim mitigations.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to full compromise of affected Wavlink AC3000 routers, allowing attackers to intercept, modify, or disrupt network traffic. This can result in data breaches, network downtime, and lateral movement within corporate networks. Critical infrastructure operators and enterprises relying on these routers for Quality of Service (QoS) management may face severe operational disruptions. The confidentiality of sensitive communications could be compromised, and attackers might establish persistent footholds for further attacks. Given the router’s network position, the impact extends beyond individual devices to the broader organizational network, potentially affecting multiple connected systems. The requirement for authentication limits exposure but does not eliminate risk, especially in environments with weak credential management or insider threats. The critical severity underscores the need for immediate attention to prevent exploitation.
Mitigation Recommendations
1. Immediately restrict access to the router’s management interface to trusted networks and users only, preferably via VPN or secure management VLANs. 2. Enforce strong authentication policies, including complex passwords and, if supported, multi-factor authentication for router access. 3. Monitor network traffic and device logs for unusual HTTP POST requests targeting qos.cgi or anomalous behavior indicative of exploitation attempts. 4. Disable QoS features or the qos.cgi interface if not essential, reducing the attack surface. 5. Maintain an inventory of all Wavlink AC3000 devices and verify firmware versions to identify vulnerable units. 6. Engage with Wavlink support channels to obtain and apply firmware updates or patches as soon as they become available. 7. Implement network segmentation to isolate critical devices and limit the spread of compromise. 8. Conduct regular security assessments and penetration tests focusing on network infrastructure devices. 9. Educate network administrators about this vulnerability and the importance of secure device management practices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2024-39802: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Wavlink Wavlink AC3000
Description
Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `qos_dat` POST parameter.
AI-Powered Analysis
Technical Analysis
CVE-2024-39802 is a classic stack-based buffer overflow vulnerability identified in the Wavlink AC3000 router firmware version M33A8.V5030.210505. The flaw resides in the qos.cgi script, specifically within the qos_settings() function that processes the qos_dat POST parameter. This parameter is not properly bounds-checked before being copied to a fixed-size buffer, allowing an attacker with authenticated HTTP access to send a specially crafted request that overflows the stack buffer. This overflow can overwrite the return address or other control data, enabling arbitrary code execution with elevated privileges on the device. The vulnerability is categorized under CWE-120 (Buffer Copy without Checking Size of Input), a well-known and dangerous class of memory corruption bugs. The CVSS v3.1 score of 9.1 reflects the vulnerability's critical nature, with network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), and complete impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported, the potential for exploitation is significant given the router’s role in network traffic management and the possibility of persistent device compromise. The vulnerability affects a specific firmware version, emphasizing the importance of firmware management and updates. The lack of available patches at the time of disclosure increases the urgency for interim mitigations.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to full compromise of affected Wavlink AC3000 routers, allowing attackers to intercept, modify, or disrupt network traffic. This can result in data breaches, network downtime, and lateral movement within corporate networks. Critical infrastructure operators and enterprises relying on these routers for Quality of Service (QoS) management may face severe operational disruptions. The confidentiality of sensitive communications could be compromised, and attackers might establish persistent footholds for further attacks. Given the router’s network position, the impact extends beyond individual devices to the broader organizational network, potentially affecting multiple connected systems. The requirement for authentication limits exposure but does not eliminate risk, especially in environments with weak credential management or insider threats. The critical severity underscores the need for immediate attention to prevent exploitation.
Mitigation Recommendations
1. Immediately restrict access to the router’s management interface to trusted networks and users only, preferably via VPN or secure management VLANs. 2. Enforce strong authentication policies, including complex passwords and, if supported, multi-factor authentication for router access. 3. Monitor network traffic and device logs for unusual HTTP POST requests targeting qos.cgi or anomalous behavior indicative of exploitation attempts. 4. Disable QoS features or the qos.cgi interface if not essential, reducing the attack surface. 5. Maintain an inventory of all Wavlink AC3000 devices and verify firmware versions to identify vulnerable units. 6. Engage with Wavlink support channels to obtain and apply firmware updates or patches as soon as they become available. 7. Implement network segmentation to isolate critical devices and limit the spread of compromise. 8. Conduct regular security assessments and penetration tests focusing on network infrastructure devices. 9. Educate network administrators about this vulnerability and the importance of secure device management practices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2024-06-28T18:05:55.314Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690929b1fe7723195e0fd84e
Added to database: 11/3/2025, 10:16:17 PM
Last enriched: 11/3/2025, 10:24:27 PM
Last updated: 12/20/2025, 5:12:09 PM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7782: CWE-862 Missing Authorization in WP JobHunt
HighCVE-2025-7733: CWE-639 Authorization Bypass Through User-Controlled Key in WP JobHunt
MediumCVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.