Cyber Posture

CVE-2024-53553

CriticalPublic PoC

Published: 16 January 2025

Published
16 January 2025
Modified
29 October 2025
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0009 24.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-53553 is a critical-severity Incorrect Authorization (CWE-863) vulnerability in Opexustech Foiaxpress Public Access Link. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 24.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SC-14 (Public Access Protections).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-3 enforces approved authorizations for logical access to information and resources, directly countering the authentication bypass via crafted requests to restricted areas.

prevent

SC-14 provides protections for publicly accessible interfaces, tailored to mitigate unauthorized access through the FOIAXPRESS public access link component.

prevent

SI-10 validates system inputs, addressing exploitation via specially crafted web requests that bypass authentication.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CVE-2024-53553 enables authentication bypass via crafted web requests on a public-facing application (OPEXUS FOIAXPRESS PUBLIC ACCESS LINK), directly facilitating T1190: Exploit Public-Facing Application.

NVD Description

An issue in OPEXUS FOIAXPRESS PUBLIC ACCESS LINK v11.1.0 allows attackers to bypass authentication via crafted web requests.

Deeper analysisAI

CVE-2024-53553 is an authentication bypass vulnerability affecting OPEXUS FOIAXPRESS PUBLIC ACCESS LINK version 11.1.0. The flaw, classified under CWE-863 (Incorrect Authorization), allows attackers to circumvent authentication mechanisms through specially crafted web requests. It has been assigned a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating critical severity due to its network accessibility, low complexity, lack of required privileges or user interaction, and potential for high confidentiality and integrity impacts.

Remote attackers with network access to the affected system can exploit this vulnerability without authentication by sending crafted requests to the public access link component. Successful exploitation enables unauthorized access to restricted resources, potentially allowing attackers to view or modify sensitive information protected by the authentication controls.

Further technical details, including potential proof-of-concept exploits, are documented in the referenced GitHub repository at https://github.com/Turbul3nce/Vulnerability.Research/tree/main/CVE-2024-53553. An additional article on related exploitation techniques is available at https://infosecwriteups.com/exploiting-execute-after-redirect-ear-vulnerability-in-htb-previse-92ea3f1dbf3d. No specific patch or mitigation guidance is detailed in the provided information.

Details

CWE(s)

Affected Products

opexustech
foiaxpress public access link
11.1.0

CVEs Like This One

CVE-2026-22230Same vendor: Opexustech
CVE-2026-22234Same vendor: Opexustech
CVE-2026-34376Shared CWE-863
CVE-2026-23989Shared CWE-863
CVE-2026-4933Shared CWE-863
CVE-2026-31887Shared CWE-863
CVE-2026-28808Shared CWE-863
CVE-2026-34532Shared CWE-863
CVE-2026-21309Shared CWE-863
CVE-2026-29087Shared CWE-863

References