11.4 C
Washington
Wednesday, April 16, 2025

Researchers Discover Command Injection Flaw in Wi-Fi Alliance’s Test Suite

Must read

A safety flaw impacting the Wi-Fi Check Suite might allow unauthenticated native attackers to execute arbitrary code with elevated privileges.

The CERT Coordination Heart (CERT/CC) mentioned the vulnerability, tracked as CVE-2024-41992, mentioned the prone code from the Wi-Fi Alliance has been discovered deployed on Arcadyan FMIMG51AX000J routers.

“This flaw permits an unauthenticated native attacker to take advantage of the Wi-Fi Check Suite by sending specifically crafted packets, enabling the execution of arbitrary instructions with root privileges on the affected routers,” the CERT/CC mentioned in an advisory launched Wednesday.

Wi-Fi Check Suite is an built-in platform developed by the Wi-Fi Alliance that automates testing Wi-Fi parts or units. Whereas open-source parts of the toolkit are publicly out there, the total bundle is obtainable solely to its members.

SSD Safe Disclosure, which launched particulars of the flaw again in August 2024, described it as a case of command injection that would allow a risk actor to execute instructions with root privileges. It was initially reported to the Wi-Fi Alliance in April 2024.

An impartial researcher, who goes by the web alias “fj016” has been credited with uncovering and reporting the safety shortcomings. The researcher has additionally made out there a proof-of-concept (PoC) exploit for the flaw.

CERT/CC famous that the Wi-Fi Check Suite will not be supposed to be used in manufacturing environments, and but has been found in business router deployments.

“An attacker who efficiently exploits this vulnerability can achieve full administrative management over the affected system,” it mentioned.

“With this entry, the attacker can modify system settings, disrupt crucial community companies, or reset the system fully. These actions may end up in service interruptions, compromise of community knowledge, and potential lack of service for all customers depending on the affected community.”

See also  A Comprehensive Guide to Finding Service Accounts in Active Directory

Within the absence of a patch, distributors who’ve included the Wi-Fi Check Suite are advisable to both take away it fully from manufacturing units or replace it to model 9.0 or later to mitigate the danger of exploitation.

The Hacker Information has reached out to the Wi-Fi Alliance for additional remark, and we are going to replace the story after we hear again.

Related News

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest News