CVE-2024-39803: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Wavlink Wavlink AC3000
Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `sel_mode` POST parameter.
AI Analysis
Technical Summary
CVE-2024-39803 is a classic stack-based buffer overflow vulnerability categorized under CWE-120, found in the qos.cgi qos_settings() functionality of the Wavlink AC3000 router firmware version M33A8.V5030.210505. The flaw exists in the handling of the sel_mode POST parameter, where the input size is not properly checked before copying into a fixed-size buffer. An attacker with valid authentication credentials can send a specially crafted HTTP POST request to the vulnerable endpoint, causing a stack overflow. This overflow can overwrite the stack memory, potentially allowing arbitrary code execution with elevated privileges, leading to full device compromise. The vulnerability affects confidentiality, integrity, and availability of the device and the network it serves. The CVSS v3.1 score is 9.1 (critical), reflecting network attack vector, low attack complexity, required privileges (high), no user interaction, and complete impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the critical nature and ease of exploitation post-authentication make this a significant threat. The vulnerability is specific to a particular firmware version, so devices running other versions may not be affected. The lack of an official patch at the time of publication increases the urgency for mitigation through access controls and monitoring.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to full compromise of affected Wavlink AC3000 routers, enabling attackers to intercept, modify, or disrupt network traffic. This could result in data breaches, unauthorized network access, lateral movement within corporate networks, and disruption of critical services. Organizations relying on these routers for network segmentation, QoS, or security enforcement may experience degraded network performance or loss of control over network policies. The critical severity means that attackers could gain persistent control over the device, potentially using it as a foothold for further attacks. Given the importance of network infrastructure in sectors such as finance, healthcare, government, and critical infrastructure in Europe, the impact could be severe, including regulatory penalties under GDPR if personal data is compromised. The requirement for authentication limits exploitation to insiders or attackers who have obtained credentials, but phishing or credential theft could facilitate this. The absence of known exploits currently provides a window for proactive defense.
Mitigation Recommendations
1. Immediately restrict administrative interface access to trusted internal networks or VPNs to reduce exposure. 2. Implement strong authentication mechanisms and enforce complex, unique passwords for router administration to prevent credential compromise. 3. Monitor network traffic and device logs for unusual POST requests to qos.cgi or signs of exploitation attempts. 4. Disable QoS features or the vulnerable qos.cgi endpoint if not required, to reduce attack surface. 5. Regularly check Wavlink’s official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 6. Employ network segmentation to isolate critical devices and limit lateral movement in case of compromise. 7. Conduct periodic vulnerability assessments and penetration testing focusing on network infrastructure devices. 8. Educate staff on credential security and phishing risks to prevent unauthorized access. 9. Consider deploying intrusion detection/prevention systems capable of detecting exploitation patterns targeting this vulnerability. 10. Maintain an inventory of all Wavlink AC3000 devices and their firmware versions to prioritize remediation efforts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2024-39803: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Wavlink Wavlink AC3000
Description
Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `sel_mode` POST parameter.
AI-Powered Analysis
Technical Analysis
CVE-2024-39803 is a classic stack-based buffer overflow vulnerability categorized under CWE-120, found in the qos.cgi qos_settings() functionality of the Wavlink AC3000 router firmware version M33A8.V5030.210505. The flaw exists in the handling of the sel_mode POST parameter, where the input size is not properly checked before copying into a fixed-size buffer. An attacker with valid authentication credentials can send a specially crafted HTTP POST request to the vulnerable endpoint, causing a stack overflow. This overflow can overwrite the stack memory, potentially allowing arbitrary code execution with elevated privileges, leading to full device compromise. The vulnerability affects confidentiality, integrity, and availability of the device and the network it serves. The CVSS v3.1 score is 9.1 (critical), reflecting network attack vector, low attack complexity, required privileges (high), no user interaction, and complete impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the critical nature and ease of exploitation post-authentication make this a significant threat. The vulnerability is specific to a particular firmware version, so devices running other versions may not be affected. The lack of an official patch at the time of publication increases the urgency for mitigation through access controls and monitoring.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to full compromise of affected Wavlink AC3000 routers, enabling attackers to intercept, modify, or disrupt network traffic. This could result in data breaches, unauthorized network access, lateral movement within corporate networks, and disruption of critical services. Organizations relying on these routers for network segmentation, QoS, or security enforcement may experience degraded network performance or loss of control over network policies. The critical severity means that attackers could gain persistent control over the device, potentially using it as a foothold for further attacks. Given the importance of network infrastructure in sectors such as finance, healthcare, government, and critical infrastructure in Europe, the impact could be severe, including regulatory penalties under GDPR if personal data is compromised. The requirement for authentication limits exploitation to insiders or attackers who have obtained credentials, but phishing or credential theft could facilitate this. The absence of known exploits currently provides a window for proactive defense.
Mitigation Recommendations
1. Immediately restrict administrative interface access to trusted internal networks or VPNs to reduce exposure. 2. Implement strong authentication mechanisms and enforce complex, unique passwords for router administration to prevent credential compromise. 3. Monitor network traffic and device logs for unusual POST requests to qos.cgi or signs of exploitation attempts. 4. Disable QoS features or the vulnerable qos.cgi endpoint if not required, to reduce attack surface. 5. Regularly check Wavlink’s official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 6. Employ network segmentation to isolate critical devices and limit lateral movement in case of compromise. 7. Conduct periodic vulnerability assessments and penetration testing focusing on network infrastructure devices. 8. Educate staff on credential security and phishing risks to prevent unauthorized access. 9. Consider deploying intrusion detection/prevention systems capable of detecting exploitation patterns targeting this vulnerability. 10. Maintain an inventory of all Wavlink AC3000 devices and their firmware versions to prioritize remediation efforts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2024-06-28T18:05:55.314Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690929b1fe7723195e0fd852
Added to database: 11/3/2025, 10:16:17 PM
Last enriched: 11/3/2025, 10:24:16 PM
Last updated: 11/5/2025, 8:01:30 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10622: Client-Side Enforcement of Server-Side Security in Red Hat Red Hat Satellite 6.18 for RHEL 9
HighCVE-2025-12677: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in mykiot KiotViet Sync
MediumCVE-2025-12676: CWE-259 Use of Hard-coded Password in mykiot KiotViet Sync
MediumCVE-2025-12675: CWE-862 Missing Authorization in mykiot KiotViet Sync
MediumCVE-2025-12674: CWE-434 Unrestricted Upload of File with Dangerous Type in mykiot KiotViet Sync
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.