Cyber Posture

CVE-2024-48456

High

Published: 06 January 2025

Published
06 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.8126 99.2th percentile
Risk Priority 64 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-48456 is a high-severity Out-of-bounds Read (CWE-125) vulnerability. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 0.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-7 (Boundary Protection) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Validates inputs like the 'password' parameter to prevent out-of-bounds reads that disclose sensitive information via crafted requests to the router web interface.

prevent

Requires timely remediation of flaws such as the out-of-bounds read vulnerability in affected Netis router firmware to eliminate the information disclosure risk.

prevent

Enforces boundary protection to restrict network access to the vulnerable router web management interface, preventing unauthenticated remote exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Why these techniques?

Direct unauthenticated exploitation of public web interface (T1190) yields admin credentials via out-of-bounds read, enabling credential access (T1552).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An issue in Netis Wifi6 Router NX10 2.0.1.3643 and 2.0.1.3582 and Netis Wifi 11AC Router NC65 3.0.0.3749 and Netis Wifi 11AC Router NC63 3.0.0.3327 and 3.0.0.3503 and Netis Wifi 11AC Router NC21 3.0.0.3800, 3.0.0.3500 and 3.0.0.3329 and Netis Wifi Router…

more

MW5360 1.0.1.3442 and 1.0.1.3031 allows a remote attacker to obtain sensitive information via the parameter password at the change admin password page at the router web interface.

Deeper analysisAI

CVE-2024-48456 is an information disclosure vulnerability affecting multiple Netis router models, including the Wifi6 Router NX10 (versions 2.0.1.3643 and 2.0.1.3582), Wifi 11AC Router NC65 (3.0.0.3749), NC63 (3.0.0.3327 and 3.0.0.3503), NC21 (3.0.0.3800, 3.0.0.3500, and 3.0.0.3329), and Wifi Router MW5360 (1.0.1.3442 and 1.0.1.3031). Classified under CWE-125 (out-of-bounds read), it allows a remote attacker to extract sensitive information via the "password" parameter on the change admin password page of the router's web interface. The issue carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with no prerequisites for exploitation.

Any unauthenticated remote attacker with network access to the router's web interface can exploit this by submitting crafted requests to the vulnerable admin password change endpoint. Exploitation yields sensitive data disclosure, such as administrator credentials or other configuration details, enabling potential privilege escalation, lateral movement, or full device takeover depending on the revealed information.

The sole reference is a GitHub project page (https://github.com/users/h00die-gr3y/projects/1/views/1), which documents the vulnerability but provides no vendor advisories, patches, or mitigation guidance. Practitioners should monitor Netis for firmware updates, restrict web interface exposure to trusted networks, and implement web application firewalls to block anomalous parameter manipulation in affected models.

Details

CWE(s)

CVEs Like This One

CVE-2026-42799Shared CWE-125
CVE-2026-7482Shared CWE-125
CVE-2026-22984Shared CWE-125
CVE-2025-69806Shared CWE-125
CVE-2026-22855Shared CWE-125
CVE-2026-41415Shared CWE-125
CVE-2025-55100Shared CWE-125
CVE-2025-48072Shared CWE-125
CVE-2025-54950Shared CWE-125
CVE-2025-1674Shared CWE-125

References