Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25851: n/a

0
High
VulnerabilityCVE-2024-25851cvecve-2024-25851
Published: Thu Feb 22 2024 (02/22/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Netis WF2780 v2.1.40144 was discovered to contain a command injection vulnerability via the config_sequence parameter in other_para of cgitest.cgi.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:47:45 UTC

Technical Analysis

CVE-2024-25851 is a command injection vulnerability identified in the Netis WF2780 router firmware version 2.1.40144. The vulnerability resides in the cgitest.cgi script, specifically through the config_sequence parameter within the other_para input. This parameter fails to properly sanitize user input, allowing an attacker with authenticated access to inject and execute arbitrary OS commands on the underlying system. The vulnerability is categorized under CWE-78, indicating improper neutralization of special elements in OS commands. The CVSS v3.1 base score is 8.0, reflecting high severity due to the combination of low attack complexity, low privileges required, no user interaction, and the potential for full compromise of confidentiality, integrity, and availability of the device. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same network or have some network access to the device. No public exploits have been reported yet, but the vulnerability poses a significant risk to affected devices. The lack of available patches at the time of publication increases the urgency for mitigation. This vulnerability could be leveraged to gain persistent control over the router, intercept or manipulate network traffic, or launch further attacks within the network.

Potential Impact

The impact of CVE-2024-25851 is substantial for organizations using Netis WF2780 routers. Successful exploitation allows attackers to execute arbitrary commands with the privileges of the web server process, potentially leading to full device compromise. This can result in unauthorized access to internal networks, interception or modification of sensitive data, disruption of network services, and use of the compromised router as a pivot point for lateral movement or launching attacks against other systems. The confidentiality, integrity, and availability of the network infrastructure relying on these routers are at risk. Given the router’s role in both home and small to medium business environments, exploitation could affect a wide range of users and organizations. The absence of known exploits in the wild currently provides a window for proactive defense, but the vulnerability’s characteristics make it a likely target for attackers once exploit code becomes available.

Mitigation Recommendations

To mitigate CVE-2024-25851, organizations should first verify if their Netis WF2780 routers are running the vulnerable firmware version 2.1.40144. Since no official patches are currently available, immediate steps include restricting access to the router’s management interface to trusted networks only, preferably via VLAN segmentation or firewall rules limiting access to the device’s IP and management ports. Disable remote management features if enabled. Monitor network traffic for unusual activity indicative of exploitation attempts. Employ network intrusion detection systems (NIDS) with signatures targeting command injection patterns in HTTP requests to cgitest.cgi. Where possible, replace affected devices with models from vendors with active security support. Additionally, implement strong authentication mechanisms and regularly audit router configurations. Stay informed of vendor updates and apply firmware patches as soon as they become available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d71b7ef31ef0b57233e

Added to database: 2/25/2026, 9:45:21 PM

Last enriched: 2/26/2026, 10:47:45 AM

Last updated: 4/12/2026, 8:33:58 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses