Executive Summary
Summary | |
---|---|
Title | Vulnerable WiFi Alliance example code found in Arcadyan FMIMG51AX000J |
Informations | |||
---|---|---|---|
Name | VU#123336 | First vendor Publication | 2024-10-23 |
Vendor | VU-CERT | Last vendor Modification | 2024-10-23 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
OverviewA command injection vulnerability has been identified in the Wi-Fi Test Suite, a tool developed by the WiFi Alliance, which has been found deployed on Arcadyan routers. This flaw allows an unauthenticated local attacker to exploit the Wi-Fi Test Suite by sending specially crafted packets, enabling the execution of arbitrary commands with root privileges on the affected routers. DescriptionThe Wi-Fi Test Suite, as described by its developer, was originally created by the Wi-Fi Alliance?a global non-profit industry association responsible for Wi-Fi standards?to support the development of certification programs and device certification. This software was not designed for use in production environments. However, it has been discovered in commercial router deployments, exposing a vulnerbility in the test code in production. The Wi-Fi Test Suite contains vulnerable code that is susceptible to command injection attacks. An attacker can exploit this vulnerability by sending specially crafted packets to a device running the Wi-Fi Test Suite, allowing them to execute commands with administrative (root) privileges. CVE-2024-41992 It is possible for an unauthenticated local attacker to use specially crafted packets to execute commands as root. ImpactAn attacker who successfully exploits this vulnerability can gain full administrative control over the affected device. With this access, the attacker can modify system settings, disrupt critical network services, or reset the device entirely. These actions can result in service interruptions, compromise of network data, and potential loss of service for all users dependent on the affected network. SolutionThe CERT/CC recommends that vendors, who have included the Wi-Fi Test Suite, to update it to version >=9.0 or remove it entirely from production devices to reduce the risk of exploitation. AcknowledgementsThanks to the reporter Noam Rathaus from SSD Disclosure. This document was written by Timur Snoke. |
Original Source
Url : https://kb.cert.org/vuls/id/123336 |
Alert History
Date | Informations |
---|---|
2024-10-23 21:22:19 |
|