Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28729: n/a

0
High
VulnerabilityCVE-2024-28729cvecve-2024-28729
Published: Tue Nov 12 2024 (11/12/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in DLink DWR 2000M 5G CPE With Wifi 6 Ax1800 and Dlink DWR 5G CPE DWR-2000M_1.34ME allows a local attacker to execute arbitrary code via a crafted request.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:56:23 UTC

Technical Analysis

CVE-2024-28729 is a vulnerability identified in the DLink DWR 2000M 5G CPE devices, specifically models supporting Wifi 6 Ax1800 and firmware version DWR-2000M_1.34ME. The issue allows a local attacker with low privileges to execute arbitrary code on the device by sending a specially crafted request. This vulnerability is categorized under CWE-77, indicating a command injection flaw where unsanitized input is passed to system commands. The attack vector is local (AV:L), meaning the attacker must have some form of local access to the device, such as through a compromised internal network or physical access. The attack complexity is low (AC:L), requiring no special conditions beyond local access, and no user interaction is needed (UI:N). The vulnerability affects confidentiality, integrity, and availability (C:H/I:H/A:H), meaning an attacker can fully control the device, potentially intercepting or manipulating network traffic, disrupting service, or using the device as a foothold for further attacks. Although no exploits are currently reported in the wild, the high CVSS score of 7.8 indicates a significant risk if exploited. No patches or firmware updates have been publicly released at the time of this report, so mitigation relies on access control and monitoring. The vulnerability’s presence in 5G CPE devices is particularly concerning given their role in providing critical network connectivity in both consumer and enterprise environments.

Potential Impact

The impact of CVE-2024-28729 is substantial for organizations relying on DLink DWR 2000M 5G CPE devices. Successful exploitation can lead to complete device compromise, allowing attackers to execute arbitrary code with low privileges. This can result in unauthorized access to network traffic, interception of sensitive data, disruption of network services, and potential lateral movement within the network. For enterprises, this could mean exposure of confidential communications and operational disruptions. For service providers and consumers, compromised CPE devices can be used as entry points for broader attacks or as part of botnets. The vulnerability undermines the integrity and availability of network infrastructure, potentially causing outages or degraded performance. Given the increasing adoption of 5G and Wifi 6 technologies, the affected devices may be deployed in critical environments, amplifying the threat’s severity. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for mitigation and patching once available.

Mitigation Recommendations

To mitigate CVE-2024-28729, organizations should first restrict local access to affected DLink devices by enforcing strict network segmentation and limiting administrative access to trusted personnel only. Disable any unnecessary local services or interfaces that could be exploited to gain local access. Monitor device logs and network traffic for unusual activity indicative of exploitation attempts. Employ network intrusion detection systems (NIDS) tuned to detect command injection patterns or anomalous requests targeting these devices. Regularly check for firmware updates or security advisories from DLink and apply patches promptly once released. If possible, replace vulnerable devices with models that have verified security updates or enhanced protections against command injection. Additionally, implement strong authentication mechanisms and consider multi-factor authentication for device management interfaces to reduce the risk of unauthorized local access. Conduct periodic security audits and penetration testing focused on CPE devices to identify and remediate weaknesses proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d98b7ef31ef0b5890be

Added to database: 2/25/2026, 9:46:00 PM

Last enriched: 2/26/2026, 5:56:23 PM

Last updated: 4/12/2026, 2:04:13 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses