CVE-2024-28325: n/a
CVE-2024-28325 is a medium-severity vulnerability affecting the Asus RT-N12+ B1 router, where credentials are stored in cleartext. This flaw allows local attackers with limited privileges to potentially obtain sensitive authentication information and modify router settings. Exploitation requires local access and some user interaction, but no advanced privileges beyond limited user rights. The vulnerability impacts confidentiality and integrity, with a low impact on availability. No known exploits are currently reported in the wild. Organizations using this router model should prioritize mitigating this risk to prevent unauthorized configuration changes and potential network compromise.
AI Analysis
Technical Summary
CVE-2024-28325 identifies a security vulnerability in the Asus RT-N12+ B1 router, where user credentials are stored in cleartext within the device. This improper credential storage corresponds to CWE-256 (Plaintext Storage of a Password) and CWE-522 (Insufficiently Protected Credentials). Because credentials are not encrypted or hashed, a local attacker with limited privileges can retrieve these credentials, enabling unauthorized access to the router's administrative interface. Once accessed, the attacker can modify router settings, potentially redirecting traffic, disabling security features, or creating persistent backdoors. The vulnerability requires local access to the device and some user interaction, which limits remote exploitation but still poses a significant risk in environments where physical or local network access is possible. The CVSS 3.1 score of 6.1 reflects medium severity, with attack vector local (AV:L), low attack complexity (AC:L), low privileges required (PR:L), and user interaction required (UI:R). The impact is primarily on confidentiality (C:L) and integrity (I:H), with a low impact on availability (A:L). No patches or exploits are currently reported, but the vulnerability highlights a critical security design flaw in credential management for this router model.
Potential Impact
The vulnerability could allow attackers with local access to extract cleartext credentials, leading to unauthorized administrative access to the router. This access can compromise network integrity by altering configurations, such as DNS settings, firewall rules, or firmware updates, potentially enabling man-in-the-middle attacks, data interception, or persistent network compromise. Confidentiality is impacted as credentials are exposed, and integrity is severely affected due to the ability to modify router settings. Availability impact is low but could occur if attackers disable network services. Organizations relying on Asus RT-N12+ B1 routers, especially in environments with shared physical or local network access, face increased risk of internal threats or lateral movement by attackers. The lack of remote exploitability reduces the threat surface but does not eliminate risk in multi-tenant or physically accessible environments.
Mitigation Recommendations
1. Immediately restrict physical and local network access to the Asus RT-N12+ B1 routers to trusted personnel only. 2. Monitor and audit local access logs to detect unauthorized attempts to access router settings. 3. Change default credentials and use strong, unique passwords to reduce risk if credentials are exposed. 4. Disable unnecessary local management interfaces or services to minimize attack vectors. 5. If possible, replace affected devices with models that implement secure credential storage and encryption. 6. Regularly check Asus security advisories for patches or firmware updates addressing this vulnerability and apply them promptly once available. 7. Implement network segmentation to isolate critical devices and limit the impact of compromised routers. 8. Educate users and administrators about the risks of local access and the importance of physical security controls. 9. Consider deploying network intrusion detection systems to identify suspicious configuration changes or unauthorized access attempts.
Affected Countries
United States, China, India, Germany, Brazil, Russia, United Kingdom, France, Japan, South Korea
CVE-2024-28325: n/a
Description
CVE-2024-28325 is a medium-severity vulnerability affecting the Asus RT-N12+ B1 router, where credentials are stored in cleartext. This flaw allows local attackers with limited privileges to potentially obtain sensitive authentication information and modify router settings. Exploitation requires local access and some user interaction, but no advanced privileges beyond limited user rights. The vulnerability impacts confidentiality and integrity, with a low impact on availability. No known exploits are currently reported in the wild. Organizations using this router model should prioritize mitigating this risk to prevent unauthorized configuration changes and potential network compromise.
AI-Powered Analysis
Technical Analysis
CVE-2024-28325 identifies a security vulnerability in the Asus RT-N12+ B1 router, where user credentials are stored in cleartext within the device. This improper credential storage corresponds to CWE-256 (Plaintext Storage of a Password) and CWE-522 (Insufficiently Protected Credentials). Because credentials are not encrypted or hashed, a local attacker with limited privileges can retrieve these credentials, enabling unauthorized access to the router's administrative interface. Once accessed, the attacker can modify router settings, potentially redirecting traffic, disabling security features, or creating persistent backdoors. The vulnerability requires local access to the device and some user interaction, which limits remote exploitation but still poses a significant risk in environments where physical or local network access is possible. The CVSS 3.1 score of 6.1 reflects medium severity, with attack vector local (AV:L), low attack complexity (AC:L), low privileges required (PR:L), and user interaction required (UI:R). The impact is primarily on confidentiality (C:L) and integrity (I:H), with a low impact on availability (A:L). No patches or exploits are currently reported, but the vulnerability highlights a critical security design flaw in credential management for this router model.
Potential Impact
The vulnerability could allow attackers with local access to extract cleartext credentials, leading to unauthorized administrative access to the router. This access can compromise network integrity by altering configurations, such as DNS settings, firewall rules, or firmware updates, potentially enabling man-in-the-middle attacks, data interception, or persistent network compromise. Confidentiality is impacted as credentials are exposed, and integrity is severely affected due to the ability to modify router settings. Availability impact is low but could occur if attackers disable network services. Organizations relying on Asus RT-N12+ B1 routers, especially in environments with shared physical or local network access, face increased risk of internal threats or lateral movement by attackers. The lack of remote exploitability reduces the threat surface but does not eliminate risk in multi-tenant or physically accessible environments.
Mitigation Recommendations
1. Immediately restrict physical and local network access to the Asus RT-N12+ B1 routers to trusted personnel only. 2. Monitor and audit local access logs to detect unauthorized attempts to access router settings. 3. Change default credentials and use strong, unique passwords to reduce risk if credentials are exposed. 4. Disable unnecessary local management interfaces or services to minimize attack vectors. 5. If possible, replace affected devices with models that implement secure credential storage and encryption. 6. Regularly check Asus security advisories for patches or firmware updates addressing this vulnerability and apply them promptly once available. 7. Implement network segmentation to isolate critical devices and limit the impact of compromised routers. 8. Educate users and administrators about the risks of local access and the importance of physical security controls. 9. Consider deploying network intrusion detection systems to identify suspicious configuration changes or unauthorized access attempts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-03-08T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d8db7ef31ef0b588549
Added to database: 2/25/2026, 9:45:49 PM
Last enriched: 2/26/2026, 11:17:55 AM
Last updated: 2/26/2026, 12:47:05 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14343: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Dokuzsoft Technology Ltd. E-Commerce Product
HighCVE-2026-1198: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Simple SA Simple.ERP
HighCVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.