At Impress IT Solutions, we prioritize keeping your systems safe from emerging cybersecurity threats. Recently, a critical security vulnerability was discovered that could affect specific access point (AP) and security router models, potentially allowing unauthorized command execution. With our expertise, Impress IT Solutions ensures that your network is patched and protected against such vulnerabilities.
This newly identified vulnerability, tracked as CVE-2024-7261 (CVSS score: 9.8), involves OS command injection, which could allow an attacker to gain unauthorized access to your system. The flaw exists in certain APs and security routers and could be exploited by sending a specially crafted cookie to the device.
How Impress IT Solutions Secures Your Systems
The vulnerability was first reported by Chengchao Ai from Fuzhou University’s ROIS team. Thanks to vigilant researchers and security teams, businesses can be made aware of these threats, but knowing about them is only half the battle. Impress IT Solutions steps in to secure your systems by providing software updates and patches to address critical flaws such as this one, ensuring your network stays protected from potential cyberattacks.
Additional Vulnerabilities and How Impress IT Solutions Can Help
In addition to CVE-2024-7261, several other high-severity vulnerabilities have been identified in routers and firewalls. If exploited, these could result in unauthorized OS command execution, denial-of-service (DoS) attacks, or exposure of sensitive browser-based information. Impress IT Solutions helps businesses by rapidly addressing these vulnerabilities to ensure network security and prevent downtime.
Some of the vulnerabilities we’ve addressed include:
- CVE-2024-5412 (CVSS score: 7.5): A buffer overflow vulnerability in the “libclinkc” library, which could allow an unauthenticated attacker to cause DoS conditions using a specially crafted HTTP request.
- CVE-2024-6343 (CVSS score: 4.9): A buffer overflow vulnerability that an attacker with admin privileges could exploit to trigger a DoS condition via a crafted HTTP request.
- CVE-2024-7203 (CVSS score: 7.2): A post-authentication command injection flaw that allows an attacker with admin privileges to execute OS commands.
- CVE-2024-42057 (CVSS score: 8.1): A command injection vulnerability in the IPSec VPN feature that allows unauthorized OS command execution.
- CVE-2024-42058 (CVSS score: 7.5): A null pointer dereference vulnerability that could result in DoS conditions.
- CVE-2024-42059 (CVSS score: 7.2): A post-authentication command injection vulnerability that could allow attackers with admin privileges to execute OS commands by uploading a crafted file via FTP.
- CVE-2024-42060 (CVSS score: 7.2): Another post-authentication command injection vulnerability in firewalls that allows attackers with admin privileges to execute OS commands.
- CVE-2024-42061 (CVSS score: 6.1): A reflected cross-site scripting (XSS) vulnerability that could be exploited to gain browser-based information by tricking users into visiting a crafted URL.
Protecting Your Business with Impress IT Solutions
At Impress IT Solutions, we don’t just react to threats—we prevent them. By regularly applying security patches and staying ahead of the latest vulnerabilities, we ensure that your network remains secure. If your systems are running outdated or unsupported software, we’re here to help you migrate to modern, secure alternatives.
For example, some router models have reached end-of-life (EoL), meaning they no longer receive updates or security patches. This was the case with D-Link’s DIR-846 router, which had several vulnerabilities, including two critical remote command execution flaws (CVE-2024-44342, CVSS score: 9.8). Since these products are no longer supported, we advise businesses to replace them with secure alternatives. Impress IT Solutions assists in assessing your equipment and providing secure, updated solutions.