HomeVulnerabilityResearchers Uncover Command Injection Flaw in Wi-Fi Alliance's Check Suite

Researchers Uncover Command Injection Flaw in Wi-Fi Alliance’s Check Suite

A security flaw impacting the Wi-Fi Check Suite might allow unauthenticated native attackers to execute arbitrary code with elevated privileges.

The CERT Coordination Middle (CERT/CC) mentioned the vulnerability, tracked as CVE-2024-41992, mentioned the prone code from the Wi-Fi Alliance has been discovered deployed on Arcadyan FMIMG51AX000J routers.

“This flaw permits an unauthenticated native attacker to take advantage of the Wi-Fi Check Suite by sending specifically crafted packets, enabling the execution of arbitrary instructions with root privileges on the affected routers,” the CERT/CC mentioned in an advisory launched Wednesday.

Cybersecurity

Wi-Fi Check Suite is an built-in platform developed by the Wi-Fi Alliance that automates testing Wi-Fi parts or units. Whereas open-source parts of the toolkit are publicly obtainable, the complete bundle is on the market solely to its members.

SSD Safe Disclosure, which launched particulars of the flaw again in August 2024, described it as a case of command injection that might allow a risk actor to execute instructions with root privileges. It was initially reported to the Wi-Fi Alliance in April 2024.

See also  Researcher Uncovers Flaws in Cox Modems, Doubtlessly Impacting Thousands and thousands

An impartial researcher, who goes by the web alias “fj016” has been credited with uncovering and reporting the security shortcomings. The researcher has additionally made obtainable a proof-of-concept (PoC) exploit for the flaw.

CERT/CC famous that the Wi-Fi Check Suite shouldn’t be supposed to be used in manufacturing environments, and but has been found in industrial router deployments.

“An attacker who efficiently exploits this vulnerability can achieve full administrative management over the affected gadget,” it mentioned.

“With this entry, the attacker can modify system settings, disrupt important community companies, or reset the gadget totally. These actions may end up in service interruptions, compromise of community knowledge, and potential lack of service for all customers depending on the affected community.”

Cybersecurity

Within the absence of a patch, distributors who’ve included the Wi-Fi Check Suite are advisable to both take away it fully from manufacturing units or replace it to model 9.0 or later to mitigate the danger of exploitation.

See also  Find out how to Construct Your Autonomous SOC Technique

The Hacker Information has reached out to the Wi-Fi Alliance for additional remark, and we are going to replace the story after we hear again.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular