CVE-2024-33439:Authenticated remote command injection vulnerability in Kasda LinkSmart Router KW5515 firmware v1.7 and earlier allows an attacker with valid credentials to execute arbitrary OS commands via CGI parameters.

splash
Back

Description Preview

This CVE covers a CWE-77 command injection flaw in Kasda LinkSmart Router KW5515 firmware up to and including version 1.7. An authenticated attacker can craft CGI parameter values that are passed to the underlying operating system without proper input sanitization, leading to arbitrary command execution on the device. Exploitation can compromise confidentiality, integrity, and availability, potentially resulting in full device compromise and further network access. The affected firmware range includes 1.7 and earlier (with the advisory noting versions up to 1.7). The vulnerability is rated as critical (CVSS v3.1 base score 9.1) with a network attack vector, no user interaction, high privileges required, and high impacts to confidentiality, integrity, and availability.

Overview

Kasda’s LinkSmart Router KW5515 contains a command injection vulnerability that can be exploited by an authenticated attacker to run OS-level commands through unsafely handled CGI parameters. Because the exploit can be performed over the network and does not require user interaction, it presents a critical risk to devices exposed to untrusted networks. The issue affects KW5515 firmware up to version 1.7, and exploitation can lead to complete compromise of the device and potential lateral movement within the network.

Remediation

  • Action 1: Update to the latest Kasda KW5515 firmware released by the vendor that contains a fix for this issue. Verify the release notes or advisories from Kasda for the exact patched version and apply it promptly.
  • Action 2: If an update is not yet available, apply compensating controls to limit exposure:
    • Disable or tightly restrict remote administration and CGI endpoints exposed to untrusted networks.
    • Place the router behind a firewall or VPN and restrict access to the admin interface to trusted networks only.
    • Implement network segmentation to isolate the router from sensitive devices.
    • Enforce strong authentication for administrative access and rotate credentials.
  • Action 3: After applying updates or mitigations, verify that CGI parameters are properly sanitized by performing targeted tests or relying on vendor guidance, and monitor device logs for suspicious CGI activity.
  • Action 4: Stay informed about vendor advisories and CVE notifications for future patches or mitigations and incorporate them into maintenance processes.

References

  • CVE-2024-33439 (MITRE): https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33439
  • Gist detailing the vulnerability and PoC: https://gist.github.com/QuartzDust/848acfddff02c881eb86dd302e859e80

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Accommodation & Food Services: Low
    Accommodation & Food Services
  2. Administrative, Support, Waste Management & Remediation Services: Low
    Administrative, Support, Waste Management & Remediation Services
  3. Agriculture, Forestry Fishing & Hunting: Low
    Agriculture, Forestry Fishing & Hunting
  4. Arts, Entertainment & Recreation: Low
    Arts, Entertainment & Recreation
  5. Construction: Low
    Construction
  6. Educational Services: Low
    Educational Services
  7. Finance and Insurance: Low
    Finance and Insurance
  8. Health Care & Social Assistance: Low
    Health Care & Social Assistance
  9. Information: Low
    Information
  10. Management of Companies & Enterprises: Low
    Management of Companies & Enterprises
  11. Manufacturing: Low
    Manufacturing
  12. Mining: Low
    Mining
  13. Other Services (except Public Administration): Low
    Other Services (except Public Administration)
  14. Professional, Scientific, & Technical Services: Low
    Professional, Scientific, & Technical Services
  15. Public Administration: Low
    Public Administration
  16. Real Estate Rental & Leasing: Low
    Real Estate Rental & Leasing
  17. Retail Trade: Low
    Retail Trade
  18. Transportation & Warehousing: Low
    Transportation & Warehousing
  19. Utilities: Low
    Utilities
  20. Wholesale Trade: Low
    Wholesale Trade

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background