Multiple vulnerabilities in Movistar 4G router

Posted date 13/03/2024
4 - High
Affected Resources
  • Router Movistar 4G, ES_WLD71-T1_v2.0.20182 version.

INCIBE has coordinated the publication of 3 vulnerabilities: two of high severity and one of medium severity, affecting the Movistar 4G router, hardware device that allows Internet connection, version ES_WLD71-T1_v2.0.201820, which have been discovered by Gabriel Gonzalez Garcia.

These vulnerabilities have been assigned the following codes, CVSS v3.1 base score, CVSS vector and CWE vulnerability type:

  • CVE-2024-2414: 8.8 | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | CWE-419
  • CVE-2024-2415: 7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | CWE-78
  • CVE-2024-2416: 6.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N| CWE-352

Vulnerabilities fixed in versions from ES_WLD71-T1_v2.0.214140 onwards, released in February 2022.

  • CVE-2024-2414: the primary channel is unprotected on Movistar 4G router affecting E version S_WLD71-T1_v2.0.201820. This device has the 'adb' service open on port 5555 and provides access to a shell with root privileges.
  • CVE-2024-2415: command injection vulnerability in Movistar 4G router affecting version ES_WLD71-T1_v2.0.201820. This vulnerability allows an authenticated user to execute commands inside the router by making a POST request to the URL '/cgi-bin/gui.cgi'.
  • CVE-2024-2416: Cross-Site Request Forgery vulnerability in Movistar's 4G router affecting version ES_WLD71-T1_v2.0.201820. This vulnerability allows an attacker to force an end user to execute unwanted actions in a web application in which they are currently authenticated.