Cyber Posture

CVE-2024-48760

CriticalPublic PoC

Published: 14 January 2025

Published
14 January 2025
Modified
06 June 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.1221 93.9th percentile
Risk Priority 27 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-48760 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Gestioip Gestioip. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 6.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-3 (Malicious Code Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents unrestricted upload of dangerous CGI files by validating file types, names, and content at the upload function to block malicious perlcmd.cgi overwrites.

prevent

Enforces restrictions on file uploads at the application boundary to prohibit executable CGI scripts and other dangerous types that enable file overwrites and RCE.

preventdetect

Deploys malicious code protection at system entry points to scan and block uploaded perlcmd.cgi files before they can overwrite upload.cgi and execute arbitrary commands.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
T1554 Compromise Host Software Binary Persistence
Adversaries may modify host software binaries to establish persistent access to systems.
Why these techniques?

File upload vulnerability in GestioIP web application enables remote attackers to overwrite legitimate CGI script (upload.cgi) with malicious perlcmd.cgi for arbitrary code execution, facilitating public-facing application exploitation, web shell deployment, and host software binary compromise.

NVD Description

An issue in GestioIP v3.5.7 allows a remote attacker to execute arbitrary code via the file upload function. The attacker can upload a malicious perlcmd.cgi file that overwrites the original upload.cgi file, enabling remote command execution.

Deeper analysisAI

CVE-2024-48760 is a critical vulnerability affecting GestioIP version 3.5.7, an IP address management tool. The flaw resides in the file upload function, where a remote attacker can upload a malicious perlcmd.cgi file that overwrites the original upload.cgi file, leading to arbitrary code execution. It has been assigned a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type).

The vulnerability can be exploited by any remote, unauthenticated attacker with network access to the affected GestioIP instance, requiring low complexity and no user interaction. Successful exploitation grants the attacker remote command execution on the server, potentially allowing full compromise including high confidentiality, integrity, and availability impacts.

References include the official GestioIP website at http://www.gestioip.net/index.html, a GitHub repository detailing the CVE at https://github.com/maxibelino/CVEs/tree/main/CVE-2024-48760, and a Docker Compose setup for GestioIP at https://github.com/muebel/gestioip-docker-compose, which security practitioners should review for additional context or potential patches.

Details

CWE(s)

Affected Products

gestioip
gestioip
3.5.7

CVEs Like This One

CVE-2024-50858Same product: Gestioip Gestioip
CVE-2020-36942Shared CWE-434
CVE-2024-57169Shared CWE-434
CVE-2023-53933Shared CWE-434
CVE-2025-68909Shared CWE-434
CVE-2021-47757Shared CWE-434
CVE-2025-68986Shared CWE-434
CVE-2025-56704Shared CWE-434
CVE-2025-0471Shared CWE-434
CVE-2025-7437Shared CWE-434

References