Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-22544: n/a

0
High
VulnerabilityCVE-2024-22544cvecve-2024-22544
Published: Tue Feb 27 2024 (02/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Linksys Router E1700 version 1.0.04 (build 3), allows authenticated attackers to execute arbitrary code via the setDateTime function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:12:33 UTC

Technical Analysis

CVE-2024-22544 is a command injection vulnerability identified in the Linksys Router E1700 version 1.0.04 (build 3). The flaw exists in the setDateTime function, which is used to set the device's system time. Due to insufficient input validation or sanitization, an authenticated attacker with low privileges can inject arbitrary commands into this function, leading to remote code execution on the device. The vulnerability is exploitable over the network (attack vector: adjacent network), requires low attack complexity, and only low-level privileges (authenticated user) are needed. No user interaction is required, and the vulnerability affects the confidentiality, integrity, and availability of the device, as arbitrary code execution can allow attackers to take full control of the router. This could enable attackers to intercept or manipulate network traffic, disrupt network services, or use the device as a foothold for further attacks within an organization’s network. The CVSS v3.1 base score is 8.0, reflecting the high impact and relatively easy exploitation conditions. The vulnerability is categorized under CWE-77 (Improper Neutralization of Special Elements used in a Command ('Command Injection')). No patches or official fixes have been published at the time of this report, and no known exploits are currently observed in the wild.

Potential Impact

The impact of CVE-2024-22544 is significant for organizations using the Linksys Router E1700 version 1.0.04 (build 3). Successful exploitation allows attackers to execute arbitrary code with the privileges of the router’s system, potentially leading to full device compromise. This can result in interception or manipulation of network traffic, disruption of network availability, and unauthorized access to internal networks. Given that routers serve as critical network perimeter devices, compromise can facilitate lateral movement, data exfiltration, or persistent access for attackers. The vulnerability’s requirement for authentication limits exposure to some extent, but many environments have weak or default credentials, increasing risk. The absence of patches means organizations must rely on mitigation strategies to reduce risk. The vulnerability could also impact home users or small businesses relying on this router model, potentially exposing sensitive personal or business data.

Mitigation Recommendations

1. Immediately change default or weak router credentials to strong, unique passwords to reduce risk of authenticated exploitation. 2. Restrict access to the router’s management interface to trusted IP addresses or internal networks only, using firewall rules or network segmentation. 3. Disable remote management features if not required to minimize exposure. 4. Monitor router logs for unusual activity or unauthorized access attempts. 5. If possible, isolate the affected router from critical network segments until a patch or firmware update is available. 6. Regularly check Linksys official channels for firmware updates or security advisories addressing this vulnerability. 7. Consider replacing the affected router with a more secure model if patching is not forthcoming. 8. Employ network intrusion detection systems to detect anomalous command injection attempts targeting the router. 9. Educate users and administrators on the risks of authenticated vulnerabilities and the importance of credential hygiene.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d4bb7ef31ef0b570110

Added to database: 2/25/2026, 9:44:43 PM

Last enriched: 2/28/2026, 9:12:33 AM

Last updated: 4/12/2026, 3:34:43 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses