VYPR
Medium severity5.9NVD Advisory· Published Mar 18, 2024· Updated Apr 15, 2026

CVE-2024-25656

CVE-2024-25656

Description

Improper input validation in AVSystem Unified Management Platform (UMP) 23.07.0.16567~LTS can result in unauthenticated CPE (Customer Premises Equipment) devices storing arbitrarily large amounts of data during registration. This can potentially lead to DDoS attacks on the application database and, ultimately, affect the entire product.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unauthenticated CPE can store arbitrarily large data during registration in AVSystem UMP 23.07.0.16567~LTS, potentially causing a DDoS via database disk exhaustion.

Vulnerability

Detail

AVSystem Unified Management Platform (UMP) version 23.07.0.16567~LTS suffers from improper input validation during the CPE (Customer Premises Equipment) registration process [1]. The registration, performed via the South Bridge Interface (SBI) as per the TR-069 specification, does not authenticate the CPE device and does not enforce any limit on the size of data fields provided by the device [1]. This allows an unauthenticated CPE to submit arbitrarily large amounts of data, including fields such as DeviceID.OUI, DeviceID.ProductClass, and multiple device information strings, leading to uncontrolled database growth [1].

Exploitation

An attacker can emulate a malicious CPE (e.g., using GenieACS-SIM simulator) and send a registration with an extremely long device ID (e.g., 1.1 megabytes) and oversized values for fields like InternetGatewayDevice.DeviceInfo.Description [1]. Since the CPE does not require authentication to register, no prior access is needed. Even though the UMP allows defining rules to filter CPE data format, the device is still registered as 'Unauthorized' and all provided data is stored in the database [1].

Impact

Repeated registrations from multiple malicious CPE devices can fill the server's storage disk, causing observable latencies in the web management interface (Device Inventory, Log generation) and in the REST API /devices endpoint [1]. In severe cases, this can lead to a denial of service (DDoS) against the application database and potentially affect the entire product [1].

Mitigation

As of the publication date (2024-03-18), no patch is mentioned in the reference. Affected users should apply input validation limits on CPE registration data and enforce authentication for registration where possible [1].

References
  1. CVCN

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.