Vulnerability Description
Wi-Fi Alliance wfa_dut (in Wi-Fi Test Suite) through 9.0.0 allows OS command injection via 802.11x frames because the system() library function is used. For example, on Arcadyan FMIMG51AX000J devices, this leads to wfaTGSendPing remote code execution as root via traffic to TCP port 8000 or 8080 on a LAN interface. On other devices, this may be exploitable over a WAN interface.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://ssd-disclosure.com/ssd-advisory-arcadyan-fmimg51ax000j-wifi-alliance-rce
- https://www.kb.cert.org/vuls/id/123336
FAQ
What is CVE-2024-41992?
CVE-2024-41992 is a vulnerability with a CVSS score of 8.8 (HIGH). Wi-Fi Alliance wfa_dut (in Wi-Fi Test Suite) through 9.0.0 allows OS command injection via 802.11x frames because the system() library function is used. For example, on Arcadyan FMIMG51AX000J devices,...
How severe is CVE-2024-41992?
CVE-2024-41992 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-41992?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.