Researchers Uncover Command Injection Flaw in Wi-Fi Alliance’s Check Suite
A safety flaw impacting the Wi-Fi Check Suite might allow unauthenticated native attackers to execute arbitrary code with elevated privileges.
The CERT Coordination Heart (CERT/CC) stated the vulnerability, tracked as CVE-2024-41992, stated the vulnerable code from the Wi-Fi Alliance has been discovered deployed on Arcadyan FMIMG51AX000J routers.
“This flaw permits an unauthenticated native attacker to use the Wi-Fi Check Suite by sending specifically crafted packets, enabling the execution of arbitrary instructions with root privileges on the affected routers,” the CERT/CC said in an advisory launched Wednesday.
Wi-Fi Check Suite is an integrated platform developed by the Wi-Fi Alliance that automates testing Wi-Fi parts or gadgets. Whereas open-source parts of the toolkit are publicly available, the total bundle is out there solely to its members.
SSD Safe Disclosure, which released particulars of the flaw again in August 2024, described it as a case of command injection that would allow a menace actor to execute instructions with root privileges. It was initially reported to the Wi-Fi Alliance in April 2024.
An unbiased researcher, who goes by the net alias “fj016” has been credited with uncovering and reporting the safety shortcomings. The researcher has additionally made available a proof-of-concept (PoC) exploit for the flaw.
CERT/CC famous that the Wi-Fi Check Suite is just not meant to be used in manufacturing environments, and but has been found in business router deployments.
“An attacker who efficiently exploits this vulnerability can achieve full administrative management over the affected system,” it stated.
“With this entry, the attacker can modify system settings, disrupt vital community providers, or reset the system totally. These actions can lead to service interruptions, compromise of community information, and potential lack of service for all customers depending on the affected community.”
Within the absence of a patch, distributors who’ve included the Wi-Fi Check Suite are beneficial to both take away it fully from manufacturing gadgets or replace it to model 9.0 or later to mitigate the chance of exploitation.
The Hacker Information has reached out to the Wi-Fi Alliance for additional remark, and we are going to replace the story once we hear again.