CVE-2024-6145: CWE-134: Use of Externally-Controlled Format String in Actiontec WCB6200Q
CVE-2024-6145 is a high-severity remote code execution vulnerability affecting the Actiontec WCB6200Q router. It arises from an externally-controlled format string flaw in the HTTP server component, specifically via a crafted Cookie header. Exploitation requires no authentication or user interaction and can be performed by network-adjacent attackers. Successful exploitation allows arbitrary code execution with the privileges of the HTTP server, impacting confidentiality, integrity, and availability. The affected firmware version is 1. 2L. 03. 5. No public exploits have been reported yet, but the vulnerability poses a significant risk due to ease of exploitation and critical impact. Organizations using this router model should prioritize mitigation to prevent potential compromise.
AI Analysis
Technical Summary
CVE-2024-6145 is a critical vulnerability classified under CWE-134 (Use of Externally-Controlled Format String) found in the Actiontec WCB6200Q router, specifically in firmware version 1.2L.03.5. The flaw exists within the router's HTTP server, where it improperly handles the Cookie header in incoming HTTP requests. An attacker can craft a malicious Cookie header containing format specifiers that the server processes without proper validation or sanitization. This leads to a format string vulnerability, enabling the attacker to execute arbitrary code remotely in the context of the HTTP server process. The vulnerability is exploitable by network-adjacent attackers without requiring any authentication or user interaction, making it highly accessible. The CVSS v3.0 base score is 8.8, reflecting the high impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the vulnerability was reported through the Zero Day Initiative (ZDI) as ZDI-CAN-21417 and published on June 18, 2024. The lack of available patches at the time of disclosure increases the urgency for affected users to implement interim mitigations and monitor for updates from the vendor.
Potential Impact
This vulnerability allows attackers to execute arbitrary code remotely on affected Actiontec WCB6200Q routers, potentially leading to full compromise of the device. The attacker can gain control over the router’s HTTP server process, which may allow them to intercept, modify, or redirect network traffic, disrupt network availability, or use the device as a foothold for further attacks within the network. Confidentiality is at risk as attackers could access sensitive information passing through the router. Integrity is compromised because attackers can alter router configurations or injected malicious payloads. Availability may be affected if the attacker disrupts router operations or causes denial of service. Given the router’s role as a network gateway, exploitation could have cascading effects on connected systems and networks, especially in enterprise or critical infrastructure environments. The ease of exploitation without authentication or user interaction significantly raises the threat level for organizations relying on this hardware.
Mitigation Recommendations
1. Immediately check for firmware updates from Actiontec and apply any patches addressing this vulnerability once available. 2. If no patch is available, restrict network access to the router’s management interface by implementing network segmentation and firewall rules to limit HTTP access only to trusted management stations. 3. Disable remote management features if not required, especially HTTP access from untrusted networks. 4. Monitor network traffic for unusual HTTP requests containing suspicious Cookie headers or other anomalies indicative of exploitation attempts. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting format string attacks targeting HTTP services. 6. Consider replacing affected devices with models that have a better security track record if patching or mitigation is not feasible. 7. Maintain regular backups of router configurations and monitor logs for signs of compromise. 8. Educate network administrators about this vulnerability and ensure incident response plans include steps for dealing with router compromises.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Brazil
CVE-2024-6145: CWE-134: Use of Externally-Controlled Format String in Actiontec WCB6200Q
Description
CVE-2024-6145 is a high-severity remote code execution vulnerability affecting the Actiontec WCB6200Q router. It arises from an externally-controlled format string flaw in the HTTP server component, specifically via a crafted Cookie header. Exploitation requires no authentication or user interaction and can be performed by network-adjacent attackers. Successful exploitation allows arbitrary code execution with the privileges of the HTTP server, impacting confidentiality, integrity, and availability. The affected firmware version is 1. 2L. 03. 5. No public exploits have been reported yet, but the vulnerability poses a significant risk due to ease of exploitation and critical impact. Organizations using this router model should prioritize mitigation to prevent potential compromise.
AI-Powered Analysis
Technical Analysis
CVE-2024-6145 is a critical vulnerability classified under CWE-134 (Use of Externally-Controlled Format String) found in the Actiontec WCB6200Q router, specifically in firmware version 1.2L.03.5. The flaw exists within the router's HTTP server, where it improperly handles the Cookie header in incoming HTTP requests. An attacker can craft a malicious Cookie header containing format specifiers that the server processes without proper validation or sanitization. This leads to a format string vulnerability, enabling the attacker to execute arbitrary code remotely in the context of the HTTP server process. The vulnerability is exploitable by network-adjacent attackers without requiring any authentication or user interaction, making it highly accessible. The CVSS v3.0 base score is 8.8, reflecting the high impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the vulnerability was reported through the Zero Day Initiative (ZDI) as ZDI-CAN-21417 and published on June 18, 2024. The lack of available patches at the time of disclosure increases the urgency for affected users to implement interim mitigations and monitor for updates from the vendor.
Potential Impact
This vulnerability allows attackers to execute arbitrary code remotely on affected Actiontec WCB6200Q routers, potentially leading to full compromise of the device. The attacker can gain control over the router’s HTTP server process, which may allow them to intercept, modify, or redirect network traffic, disrupt network availability, or use the device as a foothold for further attacks within the network. Confidentiality is at risk as attackers could access sensitive information passing through the router. Integrity is compromised because attackers can alter router configurations or injected malicious payloads. Availability may be affected if the attacker disrupts router operations or causes denial of service. Given the router’s role as a network gateway, exploitation could have cascading effects on connected systems and networks, especially in enterprise or critical infrastructure environments. The ease of exploitation without authentication or user interaction significantly raises the threat level for organizations relying on this hardware.
Mitigation Recommendations
1. Immediately check for firmware updates from Actiontec and apply any patches addressing this vulnerability once available. 2. If no patch is available, restrict network access to the router’s management interface by implementing network segmentation and firewall rules to limit HTTP access only to trusted management stations. 3. Disable remote management features if not required, especially HTTP access from untrusted networks. 4. Monitor network traffic for unusual HTTP requests containing suspicious Cookie headers or other anomalies indicative of exploitation attempts. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting format string attacks targeting HTTP services. 6. Consider replacing affected devices with models that have a better security track record if patching or mitigation is not feasible. 7. Maintain regular backups of router configurations and monitor logs for signs of compromise. 8. Educate network administrators about this vulnerability and ensure incident response plans include steps for dealing with router compromises.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2024-06-18T21:08:52.383Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 699f6bfcb7ef31ef0b55d536
Added to database: 2/25/2026, 9:39:08 PM
Last enriched: 2/26/2026, 3:01:42 AM
Last updated: 2/26/2026, 6:17:03 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.