Description Preview
This CVE covers a CWE-77 command injection flaw in Kasda LinkSmart Router KW5515 firmware up to and including version 1.7. An authenticated attacker can craft CGI parameter values that are passed to the underlying operating system without proper input sanitization, leading to arbitrary command execution on the device. Exploitation can compromise confidentiality, integrity, and availability, potentially resulting in full device compromise and further network access. The affected firmware range includes 1.7 and earlier (with the advisory noting versions up to 1.7). The vulnerability is rated as critical (CVSS v3.1 base score 9.1) with a network attack vector, no user interaction, high privileges required, and high impacts to confidentiality, integrity, and availability.
Overview
Kasda’s LinkSmart Router KW5515 contains a command injection vulnerability that can be exploited by an authenticated attacker to run OS-level commands through unsafely handled CGI parameters. Because the exploit can be performed over the network and does not require user interaction, it presents a critical risk to devices exposed to untrusted networks. The issue affects KW5515 firmware up to version 1.7, and exploitation can lead to complete compromise of the device and potential lateral movement within the network.
Remediation
- Action 1: Update to the latest Kasda KW5515 firmware released by the vendor that contains a fix for this issue. Verify the release notes or advisories from Kasda for the exact patched version and apply it promptly.
- Action 2: If an update is not yet available, apply compensating controls to limit exposure:
- Disable or tightly restrict remote administration and CGI endpoints exposed to untrusted networks.
- Place the router behind a firewall or VPN and restrict access to the admin interface to trusted networks only.
- Implement network segmentation to isolate the router from sensitive devices.
- Enforce strong authentication for administrative access and rotate credentials.
- Action 3: After applying updates or mitigations, verify that CGI parameters are properly sanitized by performing targeted tests or relying on vendor guidance, and monitor device logs for suspicious CGI activity.
- Action 4: Stay informed about vendor advisories and CVE notifications for future patches or mitigations and incorporate them into maintenance processes.
References
- CVE-2024-33439 (MITRE): https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33439
- Gist detailing the vulnerability and PoC: https://gist.github.com/QuartzDust/848acfddff02c881eb86dd302e859e80
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Accommodation & Food ServicesAccommodation & Food Services: Low
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services: Low
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting: Low
- Arts, Entertainment & RecreationArts, Entertainment & Recreation: Low
- ConstructionConstruction: Low
- Educational ServicesEducational Services: Low
- Finance and InsuranceFinance and Insurance: Low
- Health Care & Social AssistanceHealth Care & Social Assistance: Low
- InformationInformation: Low
- Management of Companies & EnterprisesManagement of Companies & Enterprises: Low
- ManufacturingManufacturing: Low
- MiningMining: Low
- Other Services (except Public Administration)Other Services (except Public Administration): Low
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services: Low
- Public AdministrationPublic Administration: Low
- Real Estate Rental & LeasingReal Estate Rental & Leasing: Low
- Retail TradeRetail Trade: Low
- Transportation & WarehousingTransportation & Warehousing: Low
- UtilitiesUtilities: Low
- Wholesale TradeWholesale Trade: Low

