Endpoint Security
,
Internet of Things Security
Unsanitized Inputs Leads to Remote Code Execution
A gaming Wi-Fi router contained a zero-day that allowed a remote unauthenticated attacker to execute arbitrary code – a flaw that a static analysis cybersecurity firm attributed to insecure coding practices.
See Also: OnDemand | OT Automated Detection and Response
Onekey on Monday said that it examined the firmware in the TP-Link Archer C5400X Tri-Band Gaming Router. The Chinese manufacturer released a patch for the vulnerability earlier this month.
The flaw, tracked as CVE-2024-5035, resided in a binary called rftest
– which, as its name implies, tests radio frequency emissions. When executed, the binary launches a TCP server and accepts commands that start with wl
or nvram.get
. But router developers neglected to sanitize inputs, which allowed attackers to inject a command by using common metacharacters such as ;
, ,
, &
and |
.
“It seems the need to provide a wireless device configuration API at TP-Link had to be answered either fast or cheap, which ended up with them exposing a supposedly limited shell over the network that clients within the router could use as a way to configure wireless devices,” Onekey said.
Routers are a perennial source of risk to enterprises and home users alike. By necessity, they are constantly exposed to the internet, but they usually are not thought of except when a signal is glitchy. Routers have been avenues for exploitation by Russian military intelligence hackers, their Chinese counterparts and oodles of cybercriminal botnets.
An international law enforcement operation announced Wednesday that it took down a botnet the FBI director called likely the world’s largest yet. The 911 S5 botnet consisted of 19 million IP addresses, federal authorities said (see: FBI Says It Dismantled ‘Likely the World’s Largest Botnet’).