Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25360: n/a

0
Medium
VulnerabilityCVE-2024-25360cvecve-2024-25360
Published: Mon Feb 12 2024 (02/12/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A hidden interface in Motorola CX2L Router firmware v1.0.1 leaks information regarding the SystemWizardStatus component via sending a crafted request to device_web_ip.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:35:15 UTC

Technical Analysis

CVE-2024-25360 identifies an information disclosure vulnerability in the Motorola CX2L Router firmware version 1.0.1. The vulnerability stems from a hidden interface within the device's firmware that exposes details about the SystemWizardStatus component. An attacker can exploit this by sending a crafted HTTP request to the router's web interface IP address, which triggers the device to leak sensitive system information. The vulnerability is classified under CWE-922 (Improper Restriction of Communication Channel to Intended Endpoints), indicating that the router improperly exposes internal interfaces that should not be accessible externally. The CVSS v3.1 base score is 5.3, reflecting a medium severity with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, meaning the attack can be performed remotely without privileges or user interaction, impacting confidentiality only. No integrity or availability impact is noted. The vulnerability is currently published with no patches or known exploits in the wild. This flaw could be leveraged by attackers to gather reconnaissance information about the router's internal state, potentially aiding in subsequent targeted attacks or exploitation of other vulnerabilities.

Potential Impact

The primary impact of CVE-2024-25360 is the unauthorized disclosure of system information related to the SystemWizardStatus component of the Motorola CX2L Router. While this does not directly compromise the integrity or availability of the device, the leaked information could provide attackers with valuable insights into the router's configuration or operational status. Such reconnaissance data can be used to tailor further attacks, including exploitation of other vulnerabilities or bypassing security controls. For organizations relying on these routers, especially in critical network infrastructure or sensitive environments, this vulnerability increases the attack surface and risk profile. Although no active exploits are reported, the ease of remote exploitation without authentication means that attackers can scan and target vulnerable devices opportunistically. This could lead to increased targeted attacks or automated scanning campaigns. The lack of a patch currently leaves affected devices exposed, emphasizing the need for interim mitigations.

Mitigation Recommendations

To mitigate CVE-2024-25360, organizations should first identify and inventory all Motorola CX2L routers running firmware version 1.0.1 within their networks. Network segmentation should be employed to isolate these devices from untrusted networks, reducing exposure to remote attackers. Monitoring network traffic for unusual or crafted HTTP requests targeting the router's web interface IP can help detect exploitation attempts. Access controls should be tightened on management interfaces, restricting access to trusted IP addresses only. Since no official patch is currently available, contacting Motorola support for guidance or potential firmware updates is recommended. Additionally, consider disabling or restricting access to any hidden or undocumented interfaces if configurable. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability, once available, can provide further protection. Finally, maintain vigilance for any updates or advisories from Motorola and apply patches promptly when released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d65b7ef31ef0b571d33

Added to database: 2/25/2026, 9:45:09 PM

Last enriched: 2/26/2026, 10:35:15 AM

Last updated: 4/12/2026, 10:29:44 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses