A safety flaw impacting the Wi-Fi Check Suite might allow unauthenticated native attackers to execute arbitrary code with elevated privileges.
The CERT Coordination Heart (CERT/CC) mentioned the vulnerability, tracked as CVE-2024-41992, mentioned the vulnerable code from the Wi-Fi Alliance has been discovered deployed on Arcadyan FMIMG51AX000J routers.
“This flaw permits an unauthenticated native attacker to take advantage of the Wi-Fi Check Suite by sending specifically crafted packets, enabling the execution of arbitrary instructions with root privileges on the affected routers,” the CERT/CC mentioned in an advisory launched Wednesday.
Wi-Fi Check Suite is an built-in platform developed by the Wi-Fi Alliance that automates testing Wi-Fi parts or gadgets. Whereas open-source parts of the toolkit are publicly out there, the complete package deal is obtainable solely to its members.
SSD Safe Disclosure, which launched particulars of the flaw again in August 2024, described it as a case of command injection that would allow a menace actor to execute instructions with root privileges. It was initially reported to the Wi-Fi Alliance in April 2024.
An impartial researcher, who goes by the web alias “fj016” has been credited with uncovering and reporting the safety shortcomings. The researcher has additionally made out there a proof-of-concept (PoC) exploit for the flaw.
CERT/CC famous that the Wi-Fi Check Suite isn’t meant to be used in manufacturing environments, and but has been found in industrial router deployments.
“An attacker who efficiently exploits this vulnerability can acquire full administrative management over the affected machine,” it mentioned.
“With this entry, the attacker can modify system settings, disrupt important community companies, or reset the machine totally. These actions can lead to service interruptions, compromise of community information, and potential lack of service for all customers depending on the affected community.”
Within the absence of a patch, distributors who’ve included the Wi-Fi Check Suite are advisable to both take away it fully from manufacturing gadgets or replace it to model 9.0 or later to mitigate the chance of exploitation.
The Hacker Information has reached out to the Wi-Fi Alliance for additional remark, and we’ll replace the story once we hear again.