Description

A security vulnerability in the Wi-Fi Test Suite may enable unauthenticated local attackers to execute arbitrary code with elevated privileges, potentially compromising affected devices. CERT Coordination Center (CERT/CC) identified this flaw, labeled CVE-2024-41992, and noted that the vulnerable code from the Wi-Fi Alliance has been found on Arcadyan FMIMG51AX000J routers. According to CERT/CC’s October 23, 2024, advisory, the flaw can be exploited by sending specifically crafted packets to the Wi-Fi Test Suite, which allows attackers to execute arbitrary commands with root-level access on affected routers. Originally developed by the Wi-Fi Alliance, the Wi-Fi Test Suite automates the testing of Wi-Fi components and devices, offering a publicly available open-source toolkit, while the full suite is accessible only to its members. SSD Secure Disclosure first detailed the vulnerability in August 2024, identifying it as a command injection issue that could allow threat actors to execute commands at root level. The flaw was initially reported to the Wi-Fi Alliance in April 2024 by an independent researcher known as “fj016,” who has shared a proof-of-concept exploit demonstrating the vulnerability. CERT/CC pointed out that while the Wi-Fi Test Suite was not intended for use in production environments, it has nonetheless appeared in commercial router settings. An attacker who successfully leverages this vulnerability can gain full administrative control over the device, enabling them to alter system configurations, disrupt network services, or even reset the router. Such actions could lead to service disruptions, exposure of network data, and potential network outages affecting all connected users.