Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28731: n/a

0
High
VulnerabilityCVE-2024-28731cvecve-2024-28731
Published: Tue Nov 12 2024 (11/12/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross Site Request Forgery vulnerability in DLink DWR 2000M 5G CPE With Wifi 6 Ax1800 and Dlink DWR 5G CPE DWR-2000M_1.34ME allows a local attacker to obtain sensitive information via the Port forwarding option.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:56:08 UTC

Technical Analysis

CVE-2024-28731 is a Cross Site Request Forgery (CSRF) vulnerability identified in DLink DWR 2000M 5G CPE devices, including the Wifi 6 Ax1800 and DWR-2000M_1.34ME models. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged request to a web application, causing the application to perform unintended actions. In this case, the vulnerability allows a local attacker with limited privileges (PR:L) to exploit the port forwarding configuration interface to extract sensitive information. The attack vector is adjacent network (AV:A), meaning the attacker must have local network access, but no user interaction (UI:N) is required once access is obtained. The vulnerability impacts confidentiality and integrity (C:H/I:H) but does not affect availability (A:N). The CVSS 3.1 base score of 7.3 reflects the high severity due to the potential for sensitive data disclosure and configuration manipulation. The vulnerability is categorized under CWE-352, which corresponds to CSRF attacks. No patches or known exploits have been reported yet, but the risk remains significant due to the nature of the affected devices, which are often used in residential and small business environments. The lack of authentication bypass or remote exploitation reduces the attack scope but does not eliminate the threat, especially in environments with weak network segmentation or compromised local users.

Potential Impact

The primary impact of CVE-2024-28731 is the unauthorized disclosure of sensitive information related to port forwarding configurations on affected DLink devices. This can lead to further exploitation, such as unauthorized network access or exposure of internal services to the internet. The integrity of device configurations can also be compromised, potentially allowing attackers to manipulate network settings to facilitate additional attacks or persistent access. For organizations, this vulnerability can undermine network security, especially if devices are deployed in critical infrastructure or business environments. The requirement for local network access limits remote exploitation but does not eliminate risk in environments with untrusted users or compromised devices. The vulnerability could facilitate lateral movement within networks and increase the attack surface. Given the widespread use of DLink devices globally, the potential impact spans residential users, small businesses, and possibly larger organizations relying on these devices for 5G connectivity.

Mitigation Recommendations

1. Implement strict CSRF protections on the device management interface, including the use of anti-CSRF tokens and validation of HTTP request origins. 2. Restrict access to the device management interface to trusted networks and authenticated users only, ideally through network segmentation and firewall rules. 3. Disable or limit port forwarding features if not required, reducing the attack surface. 4. Monitor network traffic for unusual requests targeting the port forwarding configuration endpoints. 5. Apply firmware updates as soon as they become available from DLink to address this vulnerability. 6. Educate users and administrators about the risks of local network threats and enforce strong access controls. 7. Consider deploying network access control (NAC) solutions to prevent unauthorized devices from connecting to the local network. 8. Regularly audit device configurations and logs to detect suspicious activities related to port forwarding settings.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d98b7ef31ef0b5891ab

Added to database: 2/25/2026, 9:46:00 PM

Last enriched: 2/26/2026, 5:56:08 PM

Last updated: 4/12/2026, 5:07:03 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses