CVE-2024-6145: CWE-134: Use of Externally-Controlled Format String in Actiontec WCB6200Q
Actiontec WCB6200Q Cookie Format String Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Actiontec WCB6200Q routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HTTP server. A crafted Cookie header in an HTTP request can trigger the use of a format specifier from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of the HTTP server. Was ZDI-CAN-21417.
AI Analysis
Technical Summary
CVE-2024-6145 is a critical vulnerability classified under CWE-134 (Use of Externally-Controlled Format String) found in the Actiontec WCB6200Q router, specifically in firmware version 1.2L.03.5. The flaw exists within the router's HTTP server, where it improperly handles the Cookie header in incoming HTTP requests. An attacker can craft a malicious Cookie header containing format specifiers that the server processes without proper validation or sanitization. This leads to a format string vulnerability, enabling the attacker to execute arbitrary code remotely in the context of the HTTP server process. The vulnerability is exploitable by network-adjacent attackers without requiring any authentication or user interaction, making it highly accessible. The CVSS v3.0 base score is 8.8, reflecting the high impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the vulnerability was reported through the Zero Day Initiative (ZDI) as ZDI-CAN-21417 and published on June 18, 2024. The lack of available patches at the time of disclosure increases the urgency for affected users to implement interim mitigations and monitor for updates from the vendor.
Potential Impact
This vulnerability allows attackers to execute arbitrary code remotely on affected Actiontec WCB6200Q routers, potentially leading to full compromise of the device. The attacker can gain control over the router’s HTTP server process, which may allow them to intercept, modify, or redirect network traffic, disrupt network availability, or use the device as a foothold for further attacks within the network. Confidentiality is at risk as attackers could access sensitive information passing through the router. Integrity is compromised because attackers can alter router configurations or injected malicious payloads. Availability may be affected if the attacker disrupts router operations or causes denial of service. Given the router’s role as a network gateway, exploitation could have cascading effects on connected systems and networks, especially in enterprise or critical infrastructure environments. The ease of exploitation without authentication or user interaction significantly raises the threat level for organizations relying on this hardware.
Mitigation Recommendations
1. Immediately check for firmware updates from Actiontec and apply any patches addressing this vulnerability once available. 2. If no patch is available, restrict network access to the router’s management interface by implementing network segmentation and firewall rules to limit HTTP access only to trusted management stations. 3. Disable remote management features if not required, especially HTTP access from untrusted networks. 4. Monitor network traffic for unusual HTTP requests containing suspicious Cookie headers or other anomalies indicative of exploitation attempts. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting format string attacks targeting HTTP services. 6. Consider replacing affected devices with models that have a better security track record if patching or mitigation is not feasible. 7. Maintain regular backups of router configurations and monitor logs for signs of compromise. 8. Educate network administrators about this vulnerability and ensure incident response plans include steps for dealing with router compromises.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Brazil
CVE-2024-6145: CWE-134: Use of Externally-Controlled Format String in Actiontec WCB6200Q
Description
Actiontec WCB6200Q Cookie Format String Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Actiontec WCB6200Q routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HTTP server. A crafted Cookie header in an HTTP request can trigger the use of a format specifier from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of the HTTP server. Was ZDI-CAN-21417.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-6145 is a critical vulnerability classified under CWE-134 (Use of Externally-Controlled Format String) found in the Actiontec WCB6200Q router, specifically in firmware version 1.2L.03.5. The flaw exists within the router's HTTP server, where it improperly handles the Cookie header in incoming HTTP requests. An attacker can craft a malicious Cookie header containing format specifiers that the server processes without proper validation or sanitization. This leads to a format string vulnerability, enabling the attacker to execute arbitrary code remotely in the context of the HTTP server process. The vulnerability is exploitable by network-adjacent attackers without requiring any authentication or user interaction, making it highly accessible. The CVSS v3.0 base score is 8.8, reflecting the high impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the vulnerability was reported through the Zero Day Initiative (ZDI) as ZDI-CAN-21417 and published on June 18, 2024. The lack of available patches at the time of disclosure increases the urgency for affected users to implement interim mitigations and monitor for updates from the vendor.
Potential Impact
This vulnerability allows attackers to execute arbitrary code remotely on affected Actiontec WCB6200Q routers, potentially leading to full compromise of the device. The attacker can gain control over the router’s HTTP server process, which may allow them to intercept, modify, or redirect network traffic, disrupt network availability, or use the device as a foothold for further attacks within the network. Confidentiality is at risk as attackers could access sensitive information passing through the router. Integrity is compromised because attackers can alter router configurations or injected malicious payloads. Availability may be affected if the attacker disrupts router operations or causes denial of service. Given the router’s role as a network gateway, exploitation could have cascading effects on connected systems and networks, especially in enterprise or critical infrastructure environments. The ease of exploitation without authentication or user interaction significantly raises the threat level for organizations relying on this hardware.
Mitigation Recommendations
1. Immediately check for firmware updates from Actiontec and apply any patches addressing this vulnerability once available. 2. If no patch is available, restrict network access to the router’s management interface by implementing network segmentation and firewall rules to limit HTTP access only to trusted management stations. 3. Disable remote management features if not required, especially HTTP access from untrusted networks. 4. Monitor network traffic for unusual HTTP requests containing suspicious Cookie headers or other anomalies indicative of exploitation attempts. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting format string attacks targeting HTTP services. 6. Consider replacing affected devices with models that have a better security track record if patching or mitigation is not feasible. 7. Maintain regular backups of router configurations and monitor logs for signs of compromise. 8. Educate network administrators about this vulnerability and ensure incident response plans include steps for dealing with router compromises.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2024-06-18T21:08:52.383Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 699f6bfcb7ef31ef0b55d536
Added to database: 2/25/2026, 9:39:08 PM
Last enriched: 2/26/2026, 3:01:42 AM
Last updated: 4/12/2026, 7:58:48 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.