Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39803: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Wavlink Wavlink AC3000

0
Critical
VulnerabilityCVE-2024-39803cvecve-2024-39803cwe-120
Published: Tue Jan 14 2025 (01/14/2025, 14:21:03 UTC)
Source: CVE Database V5
Vendor/Project: Wavlink
Product: Wavlink AC3000

Description

Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `sel_mode` POST parameter.

AI-Powered Analysis

AILast updated: 11/03/2025, 22:24:16 UTC

Technical Analysis

CVE-2024-39803 is a classic stack-based buffer overflow vulnerability categorized under CWE-120, found in the qos.cgi qos_settings() functionality of the Wavlink AC3000 router firmware version M33A8.V5030.210505. The flaw exists in the handling of the sel_mode POST parameter, where the input size is not properly checked before copying into a fixed-size buffer. An attacker with valid authentication credentials can send a specially crafted HTTP POST request to the vulnerable endpoint, causing a stack overflow. This overflow can overwrite the stack memory, potentially allowing arbitrary code execution with elevated privileges, leading to full device compromise. The vulnerability affects confidentiality, integrity, and availability of the device and the network it serves. The CVSS v3.1 score is 9.1 (critical), reflecting network attack vector, low attack complexity, required privileges (high), no user interaction, and complete impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the critical nature and ease of exploitation post-authentication make this a significant threat. The vulnerability is specific to a particular firmware version, so devices running other versions may not be affected. The lack of an official patch at the time of publication increases the urgency for mitigation through access controls and monitoring.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to full compromise of affected Wavlink AC3000 routers, enabling attackers to intercept, modify, or disrupt network traffic. This could result in data breaches, unauthorized network access, lateral movement within corporate networks, and disruption of critical services. Organizations relying on these routers for network segmentation, QoS, or security enforcement may experience degraded network performance or loss of control over network policies. The critical severity means that attackers could gain persistent control over the device, potentially using it as a foothold for further attacks. Given the importance of network infrastructure in sectors such as finance, healthcare, government, and critical infrastructure in Europe, the impact could be severe, including regulatory penalties under GDPR if personal data is compromised. The requirement for authentication limits exploitation to insiders or attackers who have obtained credentials, but phishing or credential theft could facilitate this. The absence of known exploits currently provides a window for proactive defense.

Mitigation Recommendations

1. Immediately restrict administrative interface access to trusted internal networks or VPNs to reduce exposure. 2. Implement strong authentication mechanisms and enforce complex, unique passwords for router administration to prevent credential compromise. 3. Monitor network traffic and device logs for unusual POST requests to qos.cgi or signs of exploitation attempts. 4. Disable QoS features or the vulnerable qos.cgi endpoint if not required, to reduce attack surface. 5. Regularly check Wavlink’s official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 6. Employ network segmentation to isolate critical devices and limit lateral movement in case of compromise. 7. Conduct periodic vulnerability assessments and penetration testing focusing on network infrastructure devices. 8. Educate staff on credential security and phishing risks to prevent unauthorized access. 9. Consider deploying intrusion detection/prevention systems capable of detecting exploitation patterns targeting this vulnerability. 10. Maintain an inventory of all Wavlink AC3000 devices and their firmware versions to prioritize remediation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2024-06-28T18:05:55.314Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690929b1fe7723195e0fd852

Added to database: 11/3/2025, 10:16:17 PM

Last enriched: 11/3/2025, 10:24:16 PM

Last updated: 11/5/2025, 8:01:30 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats