Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31973: n/a

0
Medium
VulnerabilityCVE-2024-31973cvecve-2024-31973
Published: Wed Oct 30 2024 (10/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Hitron CODA-4582 2AHKM-CODA4589 7.2.4.5.1b8 devices allow a remote attacker within Wi-Fi proximity to conduct stored XSS attacks via the 'Network Name (SSID)' input fields to the /index.html#wireless_basic page.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 02:27:48 UTC

Technical Analysis

CVE-2024-31973 is a stored Cross-Site Scripting (XSS) vulnerability identified in Hitron CODA-4582 2AHKM-CODA4589 devices running firmware version 7.2.4.5.1b8. The vulnerability arises from improper sanitization of user input in the 'Network Name (SSID)' fields on the /index.html#wireless_basic page of the device's web management interface. An attacker within Wi-Fi proximity can craft malicious SSIDs that, when viewed by an administrator or user accessing the wireless settings page, execute arbitrary JavaScript code in the context of the device's management interface. This stored XSS can lead to theft of sensitive information such as session tokens, manipulation of device settings, or further attacks on the network. The CVSS 3.1 base score is 5.2 (medium), reflecting that the attack vector is adjacent network (Wi-Fi proximity), requires no privileges, but does require user interaction (the user must visit the affected page). The scope is changed (S:C), indicating that the attack can impact components beyond the vulnerable component itself. No patches or exploits are currently known, but the vulnerability is publicly disclosed as of October 30, 2024. The CWE classification is CWE-79, which corresponds to Cross-Site Scripting. The vulnerability highlights the risk of insufficient input validation in IoT and network devices, especially those with web interfaces accessible over local networks.

Potential Impact

The primary impact of CVE-2024-31973 is on the confidentiality and integrity of the device's management interface. An attacker exploiting this vulnerability can execute arbitrary scripts in the context of the device's web interface, potentially stealing authentication tokens, capturing sensitive configuration data, or altering device settings. This can lead to unauthorized network access, persistent device compromise, or pivoting attacks within the local network. Since the attack requires Wi-Fi proximity, the threat is limited to attackers physically near the target network, such as in public or semi-public spaces. The vulnerability does not affect availability directly but could be leveraged as part of a broader attack chain. Organizations relying on these Hitron devices for critical network infrastructure may face risks of unauthorized configuration changes or data leakage. The absence of known exploits reduces immediate risk, but the public disclosure increases the likelihood of future exploitation attempts.

Mitigation Recommendations

To mitigate CVE-2024-31973, organizations should implement the following specific measures: 1) Restrict physical and wireless access to the network by enabling strong Wi-Fi encryption (WPA3 or WPA2 with strong passphrases) and disabling guest or open networks that allow easy attacker proximity. 2) Monitor and filter SSIDs broadcasted within the network environment to detect suspicious or malformed SSIDs that could be used for injection. 3) Limit access to the device's web management interface to trusted hosts or via VPN to reduce exposure. 4) Educate network administrators to avoid visiting the wireless settings page when suspicious SSIDs are detected. 5) Regularly check for firmware updates from Hitron and apply patches promptly once available. 6) Consider network segmentation to isolate management interfaces from general user networks. 7) Employ web application firewalls or intrusion detection systems capable of detecting XSS payloads in local network traffic. These steps go beyond generic advice by focusing on proximity-based attack vectors and specific device interface protections.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c30b7ef31ef0b560fc9

Added to database: 2/25/2026, 9:40:00 PM

Last enriched: 2/28/2026, 2:27:48 AM

Last updated: 4/11/2026, 12:18:58 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses