CVE-2024-31973: n/a
Hitron CODA-4582 2AHKM-CODA4589 7.2.4.5.1b8 devices allow a remote attacker within Wi-Fi proximity to conduct stored XSS attacks via the 'Network Name (SSID)' input fields to the /index.html#wireless_basic page.
AI Analysis
Technical Summary
CVE-2024-31973 is a stored Cross-Site Scripting (XSS) vulnerability identified in Hitron CODA-4582 2AHKM-CODA4589 devices running firmware version 7.2.4.5.1b8. The vulnerability arises from improper sanitization of user input in the 'Network Name (SSID)' fields on the /index.html#wireless_basic page of the device's web management interface. An attacker within Wi-Fi proximity can craft malicious SSIDs that, when viewed by an administrator or user accessing the wireless settings page, execute arbitrary JavaScript code in the context of the device's management interface. This stored XSS can lead to theft of sensitive information such as session tokens, manipulation of device settings, or further attacks on the network. The CVSS 3.1 base score is 5.2 (medium), reflecting that the attack vector is adjacent network (Wi-Fi proximity), requires no privileges, but does require user interaction (the user must visit the affected page). The scope is changed (S:C), indicating that the attack can impact components beyond the vulnerable component itself. No patches or exploits are currently known, but the vulnerability is publicly disclosed as of October 30, 2024. The CWE classification is CWE-79, which corresponds to Cross-Site Scripting. The vulnerability highlights the risk of insufficient input validation in IoT and network devices, especially those with web interfaces accessible over local networks.
Potential Impact
The primary impact of CVE-2024-31973 is on the confidentiality and integrity of the device's management interface. An attacker exploiting this vulnerability can execute arbitrary scripts in the context of the device's web interface, potentially stealing authentication tokens, capturing sensitive configuration data, or altering device settings. This can lead to unauthorized network access, persistent device compromise, or pivoting attacks within the local network. Since the attack requires Wi-Fi proximity, the threat is limited to attackers physically near the target network, such as in public or semi-public spaces. The vulnerability does not affect availability directly but could be leveraged as part of a broader attack chain. Organizations relying on these Hitron devices for critical network infrastructure may face risks of unauthorized configuration changes or data leakage. The absence of known exploits reduces immediate risk, but the public disclosure increases the likelihood of future exploitation attempts.
Mitigation Recommendations
To mitigate CVE-2024-31973, organizations should implement the following specific measures: 1) Restrict physical and wireless access to the network by enabling strong Wi-Fi encryption (WPA3 or WPA2 with strong passphrases) and disabling guest or open networks that allow easy attacker proximity. 2) Monitor and filter SSIDs broadcasted within the network environment to detect suspicious or malformed SSIDs that could be used for injection. 3) Limit access to the device's web management interface to trusted hosts or via VPN to reduce exposure. 4) Educate network administrators to avoid visiting the wireless settings page when suspicious SSIDs are detected. 5) Regularly check for firmware updates from Hitron and apply patches promptly once available. 6) Consider network segmentation to isolate management interfaces from general user networks. 7) Employ web application firewalls or intrusion detection systems capable of detecting XSS payloads in local network traffic. These steps go beyond generic advice by focusing on proximity-based attack vectors and specific device interface protections.
Affected Countries
United States, Canada, United Kingdom, Australia, Germany, France, Japan, South Korea, Taiwan, Netherlands
CVE-2024-31973: n/a
Description
Hitron CODA-4582 2AHKM-CODA4589 7.2.4.5.1b8 devices allow a remote attacker within Wi-Fi proximity to conduct stored XSS attacks via the 'Network Name (SSID)' input fields to the /index.html#wireless_basic page.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-31973 is a stored Cross-Site Scripting (XSS) vulnerability identified in Hitron CODA-4582 2AHKM-CODA4589 devices running firmware version 7.2.4.5.1b8. The vulnerability arises from improper sanitization of user input in the 'Network Name (SSID)' fields on the /index.html#wireless_basic page of the device's web management interface. An attacker within Wi-Fi proximity can craft malicious SSIDs that, when viewed by an administrator or user accessing the wireless settings page, execute arbitrary JavaScript code in the context of the device's management interface. This stored XSS can lead to theft of sensitive information such as session tokens, manipulation of device settings, or further attacks on the network. The CVSS 3.1 base score is 5.2 (medium), reflecting that the attack vector is adjacent network (Wi-Fi proximity), requires no privileges, but does require user interaction (the user must visit the affected page). The scope is changed (S:C), indicating that the attack can impact components beyond the vulnerable component itself. No patches or exploits are currently known, but the vulnerability is publicly disclosed as of October 30, 2024. The CWE classification is CWE-79, which corresponds to Cross-Site Scripting. The vulnerability highlights the risk of insufficient input validation in IoT and network devices, especially those with web interfaces accessible over local networks.
Potential Impact
The primary impact of CVE-2024-31973 is on the confidentiality and integrity of the device's management interface. An attacker exploiting this vulnerability can execute arbitrary scripts in the context of the device's web interface, potentially stealing authentication tokens, capturing sensitive configuration data, or altering device settings. This can lead to unauthorized network access, persistent device compromise, or pivoting attacks within the local network. Since the attack requires Wi-Fi proximity, the threat is limited to attackers physically near the target network, such as in public or semi-public spaces. The vulnerability does not affect availability directly but could be leveraged as part of a broader attack chain. Organizations relying on these Hitron devices for critical network infrastructure may face risks of unauthorized configuration changes or data leakage. The absence of known exploits reduces immediate risk, but the public disclosure increases the likelihood of future exploitation attempts.
Mitigation Recommendations
To mitigate CVE-2024-31973, organizations should implement the following specific measures: 1) Restrict physical and wireless access to the network by enabling strong Wi-Fi encryption (WPA3 or WPA2 with strong passphrases) and disabling guest or open networks that allow easy attacker proximity. 2) Monitor and filter SSIDs broadcasted within the network environment to detect suspicious or malformed SSIDs that could be used for injection. 3) Limit access to the device's web management interface to trusted hosts or via VPN to reduce exposure. 4) Educate network administrators to avoid visiting the wireless settings page when suspicious SSIDs are detected. 5) Regularly check for firmware updates from Hitron and apply patches promptly once available. 6) Consider network segmentation to isolate management interfaces from general user networks. 7) Employ web application firewalls or intrusion detection systems capable of detecting XSS payloads in local network traffic. These steps go beyond generic advice by focusing on proximity-based attack vectors and specific device interface protections.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-04-08T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c30b7ef31ef0b560fc9
Added to database: 2/25/2026, 9:40:00 PM
Last enriched: 2/28/2026, 2:27:48 AM
Last updated: 4/11/2026, 12:18:58 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.