Skip to main content

CVE-2024-40112: n/a in n/a

Medium
VulnerabilityCVE-2024-40112cvecve-2024-40112
Published: Mon Jun 02 2025 (06/02/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

A Local File Inclusion (LFI) vulnerability exists in Sitecom WLX-2006 Wall Mount Range Extender N300 v1.5 and before, which allows an attacker to manipulate the "language" cookie to include arbitrary files from the server. This vulnerability can be exploited to disclose sensitive information.

AI-Powered Analysis

AILast updated: 07/03/2025, 16:41:27 UTC

Technical Analysis

CVE-2024-40112 is a Local File Inclusion (LFI) vulnerability identified in the Sitecom WLX-2006 Wall Mount Range Extender N300 device, specifically in firmware versions 1.5 and earlier. The vulnerability arises due to improper validation of the "language" cookie parameter, which an attacker can manipulate to include arbitrary files from the device's local file system. Exploiting this flaw allows an attacker to read sensitive files stored on the device, potentially exposing configuration files, credentials, or other sensitive information. The vulnerability does not require authentication or user interaction, making it accessible to any attacker with network access to the device. The CVSS v3.1 base score is 5.9 (medium severity), reflecting that the attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability to a limited extent, as disclosed information could be leveraged for further attacks or device manipulation. The vulnerability is categorized under CWE-98, which relates to improper control of filename for inclusion, a common web application security issue. No known exploits are reported in the wild, and no patches or vendor advisories are currently available, indicating that mitigation may require manual intervention or firmware updates once released.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the deployment of the Sitecom WLX-2006 range extenders within their network infrastructure. These devices are typically used to extend wireless network coverage in small office or home office environments. If exploited, attackers could gain access to sensitive device files, potentially extracting network credentials or configuration details that could facilitate lateral movement or further compromise within the network. This risk is particularly relevant for organizations relying on these devices in less secure network segments or with insufficient network segmentation. The vulnerability could lead to information disclosure, undermining confidentiality, and potentially allow attackers to modify device behavior or disrupt network availability indirectly. Given the medium severity and local attack vector, the threat is more pronounced in environments where attackers have internal network access or can connect to the device's network segment. European organizations with distributed or remote offices using these devices should be especially vigilant, as attackers could exploit this vulnerability to gain footholds in less monitored network areas.

Mitigation Recommendations

To mitigate CVE-2024-40112, European organizations should first inventory their network to identify any Sitecom WLX-2006 devices running vulnerable firmware versions (v1.5 and earlier). Until an official patch is released, organizations should consider the following specific actions: 1) Restrict network access to the range extenders by implementing network segmentation and firewall rules that limit management interface exposure to trusted hosts only. 2) Disable or restrict cookie-based language settings if configurable, or monitor for unusual cookie manipulation attempts in network traffic. 3) Employ network intrusion detection systems (NIDS) with custom signatures to detect attempts to exploit LFI via the "language" cookie parameter. 4) Regularly audit device logs for suspicious access patterns or anomalies. 5) Engage with Sitecom support channels to obtain firmware updates or security advisories and apply patches promptly once available. 6) Consider replacing vulnerable devices with more secure alternatives if patching is not feasible in the short term. These targeted measures go beyond generic advice by focusing on access controls, monitoring, and proactive device management specific to the affected product and vulnerability vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-05T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 683dc31f182aa0cae24a04c9

Added to database: 6/2/2025, 3:28:31 PM

Last enriched: 7/3/2025, 4:41:27 PM

Last updated: 7/31/2025, 1:39:43 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats