The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory regarding two vulnerabilities affecting Millbeck Communications’ Proroute H685t-w 4G router. These vulnerabilities, identified as command injection (CVE-2024-45682) and cross-site scripting (CVE-2024-38380), could allow attackers to remotely execute arbitrary commands on the device or inject malicious code into a user’s browser session. The command injection vulnerability carries a critical CVSS v3.1 base score of 8.8, while the cross-site scripting vulnerability is ranked at 5.5. Both pose a serious risk to systems that rely on this device for critical operations, especially in sectors such as commercial facilities and energy.
The affected version of the router is Proroute H685t-w with firmware version 3.2.334. The command injection vulnerability, classified under CWE-77, occurs when the device fails to properly neutralize special characters in commands, allowing attackers to execute arbitrary commands on the device’s operating system. Meanwhile, the cross-site scripting vulnerability (CWE-79) arises from improper sanitization of user input, enabling attackers to inject malicious JavaScript that could compromise a user’s browser session. These vulnerabilities were discovered and reported to CISA by researcher Joe Lovett from Pen Test Partners.
To mitigate the risks associated with these vulnerabilities, Millbeck Communications recommends that users upgrade their devices to firmware version 3.2.335 or higher, which addresses both vulnerabilities. CISA also advises organizations to take additional defensive measures, such as minimizing network exposure for control system devices and implementing secure remote access methods, such as Virtual Private Networks (VPNs). The agency stresses the importance of conducting proper risk assessments and impact analyses before deploying these protective measures.
While no public exploitation of these vulnerabilities has been reported so far, CISA encourages organizations to follow recommended cybersecurity strategies for proactive defense, particularly in industrial control systems (ICS). CISA’s ICS webpage offers a variety of resources, including best practices for improving cybersecurity through a defense-in-depth strategy. Organizations are urged to remain vigilant against potential threats, including social engineering attacks, and report any suspicious activity to CISA for further analysis and tracking.
Reference: