CVE-2024-48456
Published: 06 January 2025
Summary
CVE-2024-48456 is a high-severity Out-of-bounds Read (CWE-125) vulnerability. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 0.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-7 (Boundary Protection) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Validates inputs like the 'password' parameter to prevent out-of-bounds reads that disclose sensitive information via crafted requests to the router web interface.
Requires timely remediation of flaws such as the out-of-bounds read vulnerability in affected Netis router firmware to eliminate the information disclosure risk.
Enforces boundary protection to restrict network access to the vulnerable router web management interface, preventing unauthenticated remote exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct unauthenticated exploitation of public web interface (T1190) yields admin credentials via out-of-bounds read, enabling credential access (T1552).
NVD Description
An issue in Netis Wifi6 Router NX10 2.0.1.3643 and 2.0.1.3582 and Netis Wifi 11AC Router NC65 3.0.0.3749 and Netis Wifi 11AC Router NC63 3.0.0.3327 and 3.0.0.3503 and Netis Wifi 11AC Router NC21 3.0.0.3800, 3.0.0.3500 and 3.0.0.3329 and Netis Wifi Router…
more
MW5360 1.0.1.3442 and 1.0.1.3031 allows a remote attacker to obtain sensitive information via the parameter password at the change admin password page at the router web interface.
Deeper analysisAI
CVE-2024-48456 is an information disclosure vulnerability affecting multiple Netis router models, including the Wifi6 Router NX10 (versions 2.0.1.3643 and 2.0.1.3582), Wifi 11AC Router NC65 (3.0.0.3749), NC63 (3.0.0.3327 and 3.0.0.3503), NC21 (3.0.0.3800, 3.0.0.3500, and 3.0.0.3329), and Wifi Router MW5360 (1.0.1.3442 and 1.0.1.3031). Classified under CWE-125 (out-of-bounds read), it allows a remote attacker to extract sensitive information via the "password" parameter on the change admin password page of the router's web interface. The issue carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with no prerequisites for exploitation.
Any unauthenticated remote attacker with network access to the router's web interface can exploit this by submitting crafted requests to the vulnerable admin password change endpoint. Exploitation yields sensitive data disclosure, such as administrator credentials or other configuration details, enabling potential privilege escalation, lateral movement, or full device takeover depending on the revealed information.
The sole reference is a GitHub project page (https://github.com/users/h00die-gr3y/projects/1/views/1), which documents the vulnerability but provides no vendor advisories, patches, or mitigation guidance. Practitioners should monitor Netis for firmware updates, restrict web interface exposure to trusted networks, and implement web application firewalls to block anomalous parameter manipulation in affected models.
Details
- CWE(s)